Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation_#432768#_pdf.scr.exe

Overview

General Information

Sample name:Quotation_#432768#_pdf.scr.exe
Analysis ID:1441939
MD5:52c3bf6b32a777a43cf7b59d0c0b6b46
SHA1:d691b2d4b44fde837524624af85bccb4b01cd5ec
SHA256:1c97deae0a90b78b7801e71c84b3308738b9def07711e0088e985e1dad640582
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.wapination.net", "Username": "pop@wapination.net", "Password": "sync@#1235"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4459604058.00000000028AC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.1984543642.0000000003F29000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000000.00000002.1986457181.0000000005A40000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 21 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.wapination.net", "Username": "pop@wapination.net", "Password": "sync@#1235"}
                      Source: Quotation_#432768#_pdf.scr.exeReversingLabs: Detection: 31%
                      Source: Quotation_#432768#_pdf.scr.exeVirustotal: Detection: 34%Perma Link
                      Source: Quotation_#432768#_pdf.scr.exeJoe Sandbox ML: detected
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49706 version: TLS 1.2
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: ZVRN.pdb source: Quotation_#432768#_pdf.scr.exe
                      Source: Binary string: ZVRN.pdbSHA256 source: Quotation_#432768#_pdf.scr.exe

                      Networking

                      barindex
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownFTP traffic detected: 108.179.234.136:21 -> 192.168.2.5:49708 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 06:46. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 06:46. Server port: 21.220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 06:46. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: global trafficDNS traffic detected: DNS query: ftp.wapination.net
                      Source: Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.00000000028AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.wapination.net
                      Source: Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Quotation_#432768#_pdf.scr.exeString found in binary or memory: http://tempuri.org/DataSet1.xsd
                      Source: Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.00000000028AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wapination.net
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49706 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, cPKWk.cs.Net Code: arfI
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, cPKWk.cs.Net Code: arfI

                      System Summary

                      barindex
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 3.2.Quotation_#432768#_pdf.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 3.2.Quotation_#432768#_pdf.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: initial sampleStatic PE information: Filename: Quotation_#432768#_pdf.scr.exe
                      Source: initial sampleStatic PE information: Filename: Quotation_#432768#_pdf.scr.exe
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_010CD55C0_2_010CD55C
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_05486C500_2_05486C50
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_054862B00_2_054862B0
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_05486C3F0_2_05486C3F
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_054881500_2_05488150
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_054881600_2_05488160
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_054869B80_2_054869B8
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_054869B60_2_054869B6
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_054862A00_2_054862A0
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_072B13500_2_072B1350
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_0269E2283_2_0269E228
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_0269B0A83_2_0269B0A8
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_02694A583_2_02694A58
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_02693E403_2_02693E40
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_026941883_2_02694188
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_06598E903_2_06598E90
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_0659B5D83_2_0659B5D8
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065A56783_2_065A5678
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065AC2483_2_065AC248
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065AB2FD3_2_065AB2FD
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065A31303_2_065A3130
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065A7E403_2_065A7E40
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065A77603_2_065A7760
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065AE4583_2_065AE458
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065A05213_2_065A0521
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065A00333_2_065A0033
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_065A5DAF3_2_065A5DAF
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename9d777ff5-1b53-46dc-bb82-ea82ab1c7757.exe4 vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1982375284.000000000115E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1984543642.0000000003F29000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1984061797.0000000002F66000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename9d777ff5-1b53-46dc-bb82-ea82ab1c7757.exe4 vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000000.1973259741.0000000000A82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZVRN.exeX vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1987307632.0000000007A70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1986457181.0000000005A40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename9d777ff5-1b53-46dc-bb82-ea82ab1c7757.exe4 vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4458560792.0000000000958000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exeBinary or memory string: OriginalFilenameZVRN.exeX vs Quotation_#432768#_pdf.scr.exe
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 3.2.Quotation_#432768#_pdf.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 3.2.Quotation_#432768#_pdf.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.raw.unpack, iM.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.raw.unpack, iM.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.raw.unpack, iM.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.raw.unpack, iM.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, LE2n4ybSao7Hpk1pWJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, gFdkwVwVPnHaQh4QlV.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, gFdkwVwVPnHaQh4QlV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, gFdkwVwVPnHaQh4QlV.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, gFdkwVwVPnHaQh4QlV.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, gFdkwVwVPnHaQh4QlV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, gFdkwVwVPnHaQh4QlV.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, LE2n4ybSao7Hpk1pWJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quotation_#432768#_pdf.scr.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMutant created: NULL
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Quotation_#432768#_pdf.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Quotation_#432768#_pdf.scr.exeReversingLabs: Detection: 31%
                      Source: Quotation_#432768#_pdf.scr.exeVirustotal: Detection: 34%
                      Source: unknownProcess created: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe "C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe"
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess created: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe "C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe"
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess created: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe "C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: ZVRN.pdb source: Quotation_#432768#_pdf.scr.exe
                      Source: Binary string: ZVRN.pdbSHA256 source: Quotation_#432768#_pdf.scr.exe

                      Data Obfuscation

                      barindex
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.raw.unpack, iM.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.raw.unpack, iM.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, gFdkwVwVPnHaQh4QlV.cs.Net Code: wAaHLcJIY9 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, gFdkwVwVPnHaQh4QlV.cs.Net Code: wAaHLcJIY9 System.Reflection.Assembly.Load(byte[])
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: 0xF4A5DCBC [Sun Jan 24 21:50:52 2100 UTC]
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 0_2_0548BF33 push edx; ret 0_2_0548BF36
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_026906C8 push eax; ret 3_2_02690702
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_02690698 push eax; ret 3_2_02690712
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_02690698 push eax; ret 3_2_02690722
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_02690728 push eax; ret 3_2_02690732
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_02690708 push eax; ret 3_2_02690712
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_02690718 push eax; ret 3_2_02690722
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_02690C3D push edi; ret 3_2_02690CC2
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_0659F749 push es; retf 3_2_0659F74C
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeCode function: 3_2_0659F734 push es; retf 3_2_0659F748
                      Source: Quotation_#432768#_pdf.scr.exeStatic PE information: section name: .text entropy: 7.980317797577168
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, O0jGVwaUv4MTQpjdQX.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'UNaDivB2c4', 'JmnDwDyS4p', 'COQDzETRm5', 'Nux6P2rCke', 'Lac6WJel0m', 'q4t6DHdrgq', 'yZx668FUap', 'GumHtaymywhvoFx1MkG'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, EABHNcUx7cui8QBd63.csHigh entropy of concatenated method names: 'tSY5JCtHd5', 'Wyv5Are9Dr', 'ToString', 'c6Z5ab8tVg', 'mjx5R98rMo', 'wSH5c001a2', 'hoG522oPWm', 'sAi57lQwfd', 'dUL5kRlbsQ', 'zqw5Tl5mMC'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, rvC8ruGmaXPNfQLwe7.csHigh entropy of concatenated method names: 'Dispose', 'vxcWi49uUT', 'dorDhBIPUS', 'C3188DRwXE', 'QOTWwBt1Dl', 'vpXWze2Iim', 'ProcessDialogKey', 'rtQDP1a9BE', 'Qj8DWfQF67', 'iwsDDaqVED'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, E7NfDhonfb3w9G3GDE.csHigh entropy of concatenated method names: 'K3RGaujCoW', 'NicGRrJqFj', 'cdHGcbleyk', 'xl2G28pjxd', 'VyaG7kBwUm', 'HR6GkGjlvY', 'l5hGTthCJk', 'oabG0JqwAW', 'bHbGJ0VN7K', 'l4ZGALyLbF'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, uMb4ApCpfPcSnyNGWtS.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'BjUbuBmyqu', 'SowbKnmOvJ', 'lJub1r1eId', 'KIlbEsG182', 'PoKbYdQdtI', 'WVNb4Y54Vs', 'nF7boO95rY'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, DgimkMnBa6iScPSvt3.csHigh entropy of concatenated method names: 'VSWCfucEU1', 'nMbCI14BEs', 'vwfCuQWpcm', 'wpACKqxxOj', 'jG7Chhvbbh', 'pPyCFYBAV3', 'QvcCvx9fRN', 'sONCVE678Z', 'V02CMJ8oAb', 'J34CdhQgdK'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, LE2n4ybSao7Hpk1pWJ.csHigh entropy of concatenated method names: 'HTZRuD7eHn', 'yyLRKbkCPf', 'HYZR1tG8LC', 'r00RErq1dq', 'bdSRYOoEOp', 'rDRR4di6IM', 'cceRosf6Um', 'DbTRrhjiag', 'txrRiLa8xY', 'QZVRwhxG8O'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, HmdeFwi8tqsrCpvE2J.csHigh entropy of concatenated method names: 'sil5rGnAPX', 'iD25wbslBV', 'akSGP5nHBd', 'UUwGW9gSj8', 'rm65X9K8Fg', 'E7U5IHRIE3', 'XJx5QYu2bU', 'zuL5uyveX3', 'pqQ5KURpY5', 'IPs51yMwPL'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, dldGZm5DSEMwurieaT.csHigh entropy of concatenated method names: 'ImO2ZysJdn', 'H172NEN9W2', 'kCccFsjobM', 'ylfcvLXpQM', 'I8gcVbCJRi', 'h4RcMTbjh9', 'jIYcdhvPV2', 'u29cy3KAkI', 'ObMceR7KRc', 'GWccfwaRBY'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, tvRRUXDFqgUSGWSpO6.csHigh entropy of concatenated method names: 'VsxcmSRwMh', 'L47cnfFM12', 'mDPcpZh2pk', 'quucxUJxQU', 'M27cCjP61N', 'zaPcSfADYr', 'aBMc5UwjWF', 'vPccGWVf87', 'WINcBpRQ3a', 'Qt4cb6dCNI'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, XTZtPXzKNYCGVd6uBL.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FMrBqO55PS', 'oETBCkNWHS', 'tZRBSCJRIy', 'eTjB59yWWJ', 'w3RBGcDtBm', 'XkIBBiF6Oi', 'DPOBbOoYhl'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, DIBgUJCEUsMeqLocKNq.csHigh entropy of concatenated method names: 'DaQBsMrDIZ', 'VjUBgusk7S', 'EIEBLYxCYR', 'wcQBm9eHqO', 'uc7BZpSCaH', 'BfmBnpeghM', 'jJrBN0ks7k', 'unyBpJr0i7', 'AxvBxmMGXk', 'G9LB3wvT80'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, Eoqqh5Ml9sAhqOSsO7.csHigh entropy of concatenated method names: 'JLEGj8pL3f', 'C8QGhbLrhF', 'ihVGFpFxTk', 'HbqGv5b791', 'uvqGuqb3LE', 'eEuGVZyqE9', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, Axfdph8yP8NSKfbt33.csHigh entropy of concatenated method names: 'FqyqphGrAL', 'UMRqx422Qr', 'sK2qjR7hAQ', 'csvqhKlHjE', 'mLiqvJiYhu', 'FLfqV4pYwA', 'N9Kqdqpotq', 'mZeqygJY7A', 'ghIqf4Y05p', 'dTPqX1Qyb8'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, mjhnXHcNg8OBvjD731.csHigh entropy of concatenated method names: 'ceo7taiGSy', 'J0n7RI5n1k', 'EjI72ShQeg', 'UDm7k7AHZu', 'QF37Tw4l2w', 'zWh2Y03a4M', 'sjf24vQcAi', 'mMW2oH49Ij', 'Oan2rc1ead', 'tRp2iSk5uL'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, D3TLCyXfFxX4gvM42K.csHigh entropy of concatenated method names: 'WBhLUSNMu', 'tOCmblwjh', 'yD4n7TKgL', 'LrQN14wFA', 'oIWxcZImY', 'u2W3mIASC', 'lyBPlX8hAAKfss2o9u', 'XxZdcD4sDhXe4CQ4Kl', 'KExGfPYit', 'CqubLcjQl'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, gFdkwVwVPnHaQh4QlV.csHigh entropy of concatenated method names: 'SWV6tYwxR1', 'X6M6ajSm5j', 'Qqw6RHWESw', 'YtW6ccy08V', 'a8862h6v3r', 'fcx67EDGol', 'Ovw6k97Esg', 'ED36THRJYx', 'EKP60UZQT7', 'Olr6JT5PZC'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, ePkS30kFgfcvdqkOuC.csHigh entropy of concatenated method names: 'xPKksy7hEC', 'HjRkgSKSBR', 'o6ekLqOmgV', 'R6XkmqZDOf', 'ncXkZ5M9qx', 'lSwknqhjyo', 'uXVkNYPUpZ', 'T0PkpnRN5e', 'vk8kx2aINS', 'ygck3q2iuH'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, V0jgndFki4pFRgA91I.csHigh entropy of concatenated method names: 'DFhBW85TTF', 'fcfB6yGjwh', 'SYIBH80U6R', 'NZiBarpKEd', 'uB7BRk4gJr', 'CKXB22qUnS', 'yUbB7GfLyr', 'BMGGoxmoJf', 'jEUGrY9LTU', 'DFXGi89vMe'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, VhOVCGr6RR3qufgNAQ.csHigh entropy of concatenated method names: 'fNpWkYoBwq', 'AuoWTonbfJ', 'w20WJMHiDw', 'ScgWASB4wc', 'WlnWCtSRII', 'RBtWSHGF49', 'wwF82WojRUDirnK0I0', 'otXWXZ6LZmhggCl6gA', 'k3YWWVyWfT', 'n97W6dq5th'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, pLRVFvfot7kIP6Idfv.csHigh entropy of concatenated method names: 'ToString', 'ywjSX4TEQD', 'YqcShwn3fH', 'toPSFSdtCK', 'ja9SvIkOum', 'QsOSV33Hj5', 'IkiSMF0apa', 'B8rSdOGtxO', 'SFKSycbBV8', 'WQQSeqLOVy'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.7a70000.8.raw.unpack, kx9fJU6dXwdDAAjGIw.csHigh entropy of concatenated method names: 'bWDkarMFyZ', 'wa2kc3FAZX', 'juYk7boAnw', 'DKC7wHtFMt', 'bNR7z9ATZ9', 'eX0kP0n8mO', 'zrbkWNtg3v', 'Ho5kDCtJgQ', 'qiVk68FSDl', 'HcIkHsaWxx'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, O0jGVwaUv4MTQpjdQX.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'UNaDivB2c4', 'JmnDwDyS4p', 'COQDzETRm5', 'Nux6P2rCke', 'Lac6WJel0m', 'q4t6DHdrgq', 'yZx668FUap', 'GumHtaymywhvoFx1MkG'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, EABHNcUx7cui8QBd63.csHigh entropy of concatenated method names: 'tSY5JCtHd5', 'Wyv5Are9Dr', 'ToString', 'c6Z5ab8tVg', 'mjx5R98rMo', 'wSH5c001a2', 'hoG522oPWm', 'sAi57lQwfd', 'dUL5kRlbsQ', 'zqw5Tl5mMC'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, rvC8ruGmaXPNfQLwe7.csHigh entropy of concatenated method names: 'Dispose', 'vxcWi49uUT', 'dorDhBIPUS', 'C3188DRwXE', 'QOTWwBt1Dl', 'vpXWze2Iim', 'ProcessDialogKey', 'rtQDP1a9BE', 'Qj8DWfQF67', 'iwsDDaqVED'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, E7NfDhonfb3w9G3GDE.csHigh entropy of concatenated method names: 'K3RGaujCoW', 'NicGRrJqFj', 'cdHGcbleyk', 'xl2G28pjxd', 'VyaG7kBwUm', 'HR6GkGjlvY', 'l5hGTthCJk', 'oabG0JqwAW', 'bHbGJ0VN7K', 'l4ZGALyLbF'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, uMb4ApCpfPcSnyNGWtS.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'BjUbuBmyqu', 'SowbKnmOvJ', 'lJub1r1eId', 'KIlbEsG182', 'PoKbYdQdtI', 'WVNb4Y54Vs', 'nF7boO95rY'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, DgimkMnBa6iScPSvt3.csHigh entropy of concatenated method names: 'VSWCfucEU1', 'nMbCI14BEs', 'vwfCuQWpcm', 'wpACKqxxOj', 'jG7Chhvbbh', 'pPyCFYBAV3', 'QvcCvx9fRN', 'sONCVE678Z', 'V02CMJ8oAb', 'J34CdhQgdK'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, LE2n4ybSao7Hpk1pWJ.csHigh entropy of concatenated method names: 'HTZRuD7eHn', 'yyLRKbkCPf', 'HYZR1tG8LC', 'r00RErq1dq', 'bdSRYOoEOp', 'rDRR4di6IM', 'cceRosf6Um', 'DbTRrhjiag', 'txrRiLa8xY', 'QZVRwhxG8O'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, HmdeFwi8tqsrCpvE2J.csHigh entropy of concatenated method names: 'sil5rGnAPX', 'iD25wbslBV', 'akSGP5nHBd', 'UUwGW9gSj8', 'rm65X9K8Fg', 'E7U5IHRIE3', 'XJx5QYu2bU', 'zuL5uyveX3', 'pqQ5KURpY5', 'IPs51yMwPL'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, dldGZm5DSEMwurieaT.csHigh entropy of concatenated method names: 'ImO2ZysJdn', 'H172NEN9W2', 'kCccFsjobM', 'ylfcvLXpQM', 'I8gcVbCJRi', 'h4RcMTbjh9', 'jIYcdhvPV2', 'u29cy3KAkI', 'ObMceR7KRc', 'GWccfwaRBY'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, tvRRUXDFqgUSGWSpO6.csHigh entropy of concatenated method names: 'VsxcmSRwMh', 'L47cnfFM12', 'mDPcpZh2pk', 'quucxUJxQU', 'M27cCjP61N', 'zaPcSfADYr', 'aBMc5UwjWF', 'vPccGWVf87', 'WINcBpRQ3a', 'Qt4cb6dCNI'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, XTZtPXzKNYCGVd6uBL.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FMrBqO55PS', 'oETBCkNWHS', 'tZRBSCJRIy', 'eTjB59yWWJ', 'w3RBGcDtBm', 'XkIBBiF6Oi', 'DPOBbOoYhl'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, DIBgUJCEUsMeqLocKNq.csHigh entropy of concatenated method names: 'DaQBsMrDIZ', 'VjUBgusk7S', 'EIEBLYxCYR', 'wcQBm9eHqO', 'uc7BZpSCaH', 'BfmBnpeghM', 'jJrBN0ks7k', 'unyBpJr0i7', 'AxvBxmMGXk', 'G9LB3wvT80'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, Eoqqh5Ml9sAhqOSsO7.csHigh entropy of concatenated method names: 'JLEGj8pL3f', 'C8QGhbLrhF', 'ihVGFpFxTk', 'HbqGv5b791', 'uvqGuqb3LE', 'eEuGVZyqE9', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, Axfdph8yP8NSKfbt33.csHigh entropy of concatenated method names: 'FqyqphGrAL', 'UMRqx422Qr', 'sK2qjR7hAQ', 'csvqhKlHjE', 'mLiqvJiYhu', 'FLfqV4pYwA', 'N9Kqdqpotq', 'mZeqygJY7A', 'ghIqf4Y05p', 'dTPqX1Qyb8'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, mjhnXHcNg8OBvjD731.csHigh entropy of concatenated method names: 'ceo7taiGSy', 'J0n7RI5n1k', 'EjI72ShQeg', 'UDm7k7AHZu', 'QF37Tw4l2w', 'zWh2Y03a4M', 'sjf24vQcAi', 'mMW2oH49Ij', 'Oan2rc1ead', 'tRp2iSk5uL'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, D3TLCyXfFxX4gvM42K.csHigh entropy of concatenated method names: 'WBhLUSNMu', 'tOCmblwjh', 'yD4n7TKgL', 'LrQN14wFA', 'oIWxcZImY', 'u2W3mIASC', 'lyBPlX8hAAKfss2o9u', 'XxZdcD4sDhXe4CQ4Kl', 'KExGfPYit', 'CqubLcjQl'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, gFdkwVwVPnHaQh4QlV.csHigh entropy of concatenated method names: 'SWV6tYwxR1', 'X6M6ajSm5j', 'Qqw6RHWESw', 'YtW6ccy08V', 'a8862h6v3r', 'fcx67EDGol', 'Ovw6k97Esg', 'ED36THRJYx', 'EKP60UZQT7', 'Olr6JT5PZC'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, ePkS30kFgfcvdqkOuC.csHigh entropy of concatenated method names: 'xPKksy7hEC', 'HjRkgSKSBR', 'o6ekLqOmgV', 'R6XkmqZDOf', 'ncXkZ5M9qx', 'lSwknqhjyo', 'uXVkNYPUpZ', 'T0PkpnRN5e', 'vk8kx2aINS', 'ygck3q2iuH'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, V0jgndFki4pFRgA91I.csHigh entropy of concatenated method names: 'DFhBW85TTF', 'fcfB6yGjwh', 'SYIBH80U6R', 'NZiBarpKEd', 'uB7BRk4gJr', 'CKXB22qUnS', 'yUbB7GfLyr', 'BMGGoxmoJf', 'jEUGrY9LTU', 'DFXGi89vMe'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, VhOVCGr6RR3qufgNAQ.csHigh entropy of concatenated method names: 'fNpWkYoBwq', 'AuoWTonbfJ', 'w20WJMHiDw', 'ScgWASB4wc', 'WlnWCtSRII', 'RBtWSHGF49', 'wwF82WojRUDirnK0I0', 'otXWXZ6LZmhggCl6gA', 'k3YWWVyWfT', 'n97W6dq5th'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, pLRVFvfot7kIP6Idfv.csHigh entropy of concatenated method names: 'ToString', 'ywjSX4TEQD', 'YqcShwn3fH', 'toPSFSdtCK', 'ja9SvIkOum', 'QsOSV33Hj5', 'IkiSMF0apa', 'B8rSdOGtxO', 'SFKSycbBV8', 'WQQSeqLOVy'
                      Source: 0.2.Quotation_#432768#_pdf.scr.exe.4327db0.3.raw.unpack, kx9fJU6dXwdDAAjGIw.csHigh entropy of concatenated method names: 'bWDkarMFyZ', 'wa2kc3FAZX', 'juYk7boAnw', 'DKC7wHtFMt', 'bNR7z9ATZ9', 'eX0kP0n8mO', 'zrbkWNtg3v', 'Ho5kDCtJgQ', 'qiVk68FSDl', 'HcIkHsaWxx'
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: Quotation_#432768#_pdf.scr.exe PID: 6388, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 10C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 1350000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 7BF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 8BF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 8DA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 9DA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 2690000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 2830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: 4830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599875Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599765Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599651Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599531Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599422Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599312Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599203Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599093Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598984Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598875Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598756Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598632Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598527Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598395Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598265Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598156Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598046Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597937Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597828Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597718Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597609Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597500Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597390Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597281Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597172Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597062Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596953Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596843Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596734Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596624Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596500Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596390Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596279Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596171Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596047Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595937Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595828Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595718Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595594Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595484Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595375Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595265Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595140Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595031Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594921Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594812Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594703Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594593Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594484Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594375Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeWindow / User API: threadDelayed 8122Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeWindow / User API: threadDelayed 1725Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 5052Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep count: 33 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -599875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 5068Thread sleep count: 8122 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 5068Thread sleep count: 1725 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -599765s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -599651s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -599531s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -599422s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -599312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -599203s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -599093s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598984s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598756s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598632s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598527s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598395s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598265s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598156s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -598046s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597937s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597718s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597609s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597390s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597281s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597172s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -597062s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596953s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596843s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596734s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596390s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596279s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596171s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -596047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595937s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595718s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595375s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595265s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595140s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -595031s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -594921s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -594812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -594703s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -594593s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -594484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe TID: 3224Thread sleep time: -594375s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599875Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599765Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599651Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599531Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599422Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599312Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599203Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 599093Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598984Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598875Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598756Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598632Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598527Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598395Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598265Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598156Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 598046Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597937Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597828Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597718Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597609Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597500Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597390Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597281Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597172Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 597062Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596953Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596843Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596734Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596624Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596500Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596390Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596279Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596171Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 596047Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595937Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595828Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595718Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595594Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595484Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595375Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595265Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595140Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 595031Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594921Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594812Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594703Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594593Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594484Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeThread delayed: delay time: 594375Jump to behavior
                      Source: Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4458691903.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeProcess created: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe "C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Quotation_#432768#_pdf.scr.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4459604058.00000000028AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.4459604058.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quotation_#432768#_pdf.scr.exe PID: 6388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Quotation_#432768#_pdf.scr.exe PID: 5880, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1984543642.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1986457181.0000000005A40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Quotation_#432768#_pdf.scr.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.4459604058.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quotation_#432768#_pdf.scr.exe PID: 6388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Quotation_#432768#_pdf.scr.exe PID: 5880, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Quotation_#432768#_pdf.scr.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41edc10.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.41b35f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4459604058.00000000028AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.4459604058.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quotation_#432768#_pdf.scr.exe PID: 6388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Quotation_#432768#_pdf.scr.exe PID: 5880, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.5a40000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation_#432768#_pdf.scr.exe.3f40f90.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1984543642.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1986457181.0000000005A40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      1
                      Exfiltration Over Alternative Protocol
                      Abuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      1
                      Query Registry
                      SMB/Windows Admin Shares1
                      Email Collection
                      2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                      Software Packing
                      NTDS111
                      Security Software Discovery
                      Distributed Component Object Model1
                      Input Capture
                      23
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets1
                      Process Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials141
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Masquerading
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                      Virtualization/Sandbox Evasion
                      Proc Filesystem1
                      System Network Configuration Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Quotation_#432768#_pdf.scr.exe32%ReversingLabsByteCode-MSIL.Trojan.Generic
                      Quotation_#432768#_pdf.scr.exe34%VirustotalBrowse
                      Quotation_#432768#_pdf.scr.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      api.ipify.org1%VirustotalBrowse
                      wapination.net0%VirustotalBrowse
                      ftp.wapination.net1%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://api.ipify.org/0%URL Reputationsafe
                      https://api.ipify.org/0%URL Reputationsafe
                      https://api.ipify.org0%URL Reputationsafe
                      https://account.dyn.com/0%URL Reputationsafe
                      https://account.dyn.com/0%URL Reputationsafe
                      https://api.ipify.org/t0%URL Reputationsafe
                      https://api.ipify.org/t0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      http://wapination.net0%Avira URL Cloudsafe
                      http://tempuri.org/DataSet1.xsd0%Avira URL Cloudsafe
                      http://ftp.wapination.net0%Avira URL Cloudsafe
                      http://wapination.net0%VirustotalBrowse
                      http://tempuri.org/DataSet1.xsd2%VirustotalBrowse
                      http://ftp.wapination.net1%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ipify.org
                      172.67.74.152
                      truefalseunknown
                      wapination.net
                      108.179.234.136
                      truefalseunknown
                      ftp.wapination.net
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.orgQuotation_#432768#_pdf.scr.exe, 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.0000000002831000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ftp.wapination.netQuotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.00000000028AC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://account.dyn.com/Quotation_#432768#_pdf.scr.exe, 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, Quotation_#432768#_pdf.scr.exe, 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.org/tQuotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.0000000002831000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.0000000002831000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://wapination.netQuotation_#432768#_pdf.scr.exe, 00000003.00000002.4459604058.00000000028AC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/DataSet1.xsdQuotation_#432768#_pdf.scr.exefalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      108.179.234.136
                      wapination.netUnited States
                      46606UNIFIEDLAYER-AS-1USfalse
                      172.67.74.152
                      api.ipify.orgUnited States
                      13335CLOUDFLARENETUSfalse
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1441939
                      Start date and time:2024-05-15 13:46:05 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 29s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Quotation_#432768#_pdf.scr.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 81
                      • Number of non-executed functions: 13
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      13:46:49API Interceptor10939191x Sleep call for process: Quotation_#432768#_pdf.scr.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      108.179.234.136Payment Advice Copy-EUR 5500,00 20240419165413-docx.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        Payment_Advice-pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                          172.67.74.152stub.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          stub.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta.exeGet hashmaliciousStealitBrowse
                          • api.ipify.org/?format=json
                          SongOfVikings.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          SongOfVikings.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          api.ipify.orgPurchase order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          MT_078410_00_032.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Copy#1905208.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.13.205
                          rMT_IEVOLI_SPRINT_pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          BANK SWIFT.pdf_________________________________________________________________________.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.12.205
                          Xlrfx.batGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.12.205
                          Order List 300572024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.13.205
                          new order 20240508.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.12.205
                          Shipping Advice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.13.205
                          new order 20240508.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          UNIFIEDLAYER-AS-1USAWB#150322.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 50.87.253.239
                          Document.exeGet hashmaliciousMyDoomBrowse
                          • 192.254.190.168
                          Revised Order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 162.241.123.127
                          Order Items.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                          • 162.240.81.18
                          ITEMS.xlsGet hashmaliciousFormBook, PureLog StealerBrowse
                          • 162.240.81.18
                          https://fms-logistics.antena1foz.com.br/fdufigu/zoaodfhaza/xoforniche/Dkbvtyesxq/gvxQafolA/Get hashmaliciousUnknownBrowse
                          • 162.214.126.9
                          facturas y albaranes del mes de marzo y abril-pdf.exeGet hashmaliciousFormBookBrowse
                          • 162.240.81.18
                          vm6XYZzWOd.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                          • 192.254.224.20
                          rCheq0004783.batGet hashmaliciousFormBook, GuLoaderBrowse
                          • 108.167.183.29
                          rRFQ_251477800TM.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 108.167.140.123
                          CLOUDFLARENETUShttp://academictutoringcenters.comGet hashmaliciousUnknownBrowse
                          • 104.16.117.116
                          file.exeGet hashmaliciousRisePro StealerBrowse
                          • 104.26.5.15
                          scan_document.htmlGet hashmaliciousUnknownBrowse
                          • 104.18.24.163
                          Purchase order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          MT_078410_00_032.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Copy#1905208.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.13.205
                          rMT_IEVOLI_SPRINT_pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          BANK SWIFT.pdf_________________________________________________________________________.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.12.205
                          Xlrfx.batGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.12.205
                          Order List 300572024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.13.205
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          3b5074b1b5d032e5620f69f9f700ff0ePurchase order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          MT_078410_00_032.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Copy#1905208.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          rMT_IEVOLI_SPRINT_pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          BANK SWIFT.pdf_________________________________________________________________________.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Xlrfx.batGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Order List 300572024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          new order 20240508.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Shipping Advice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          new order 20240508.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          No context
                          Process:C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1216
                          Entropy (8bit):5.34331486778365
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.974387281518562
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:Quotation_#432768#_pdf.scr.exe
                          File size:716'288 bytes
                          MD5:52c3bf6b32a777a43cf7b59d0c0b6b46
                          SHA1:d691b2d4b44fde837524624af85bccb4b01cd5ec
                          SHA256:1c97deae0a90b78b7801e71c84b3308738b9def07711e0088e985e1dad640582
                          SHA512:50120e417ba5f64c33b289765261ff83ccaf06eaaa77a85451218257ac3ba56dddacd27833449ad8bc3fbc08014795d55ee2035fad01998a59bddde52b6debad
                          SSDEEP:12288:Qci2iN3skSKSIw6RC9eYIgHlrFtZ+0FrjM8vAqWFDG+XdMrwzJaLB7qDY:Q319JSNIoPISRts0NiGqdMrw1axq0
                          TLSH:1AE4230D7790AB1FE73F93B55A98C21583327507661CD35A2EC920C78EEA391C7B096B
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ... ....@.. .......................`............@................................
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x4b00f6
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0xF4A5DCBC [Sun Jan 24 21:50:52 2100 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xb00a20x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x658.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xae51c0x70.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xae0fc0xae200dc0b861003a272bf517f743b30862d84False0.9759960516870064data7.980317797577168IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xb20000x6580x800c3fb658149af0eb69f09c82ee451c48cFalse0.34423828125data3.5324990894528225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xb40000xc0x2000901ceb4416091449ea24f54c4d5ff51False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_VERSION0xb20900x3c8data0.4121900826446281
                          RT_MANIFEST0xb24680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSource PortDest PortSource IPDest IP
                          May 15, 2024 13:46:51.233519077 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:51.233553886 CEST44349706172.67.74.152192.168.2.5
                          May 15, 2024 13:46:51.233616114 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:51.242239952 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:51.242264986 CEST44349706172.67.74.152192.168.2.5
                          May 15, 2024 13:46:51.473834038 CEST44349706172.67.74.152192.168.2.5
                          May 15, 2024 13:46:51.473927975 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:51.496670961 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:51.496690035 CEST44349706172.67.74.152192.168.2.5
                          May 15, 2024 13:46:51.497034073 CEST44349706172.67.74.152192.168.2.5
                          May 15, 2024 13:46:51.548254967 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:52.053915977 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:52.100128889 CEST44349706172.67.74.152192.168.2.5
                          May 15, 2024 13:46:52.233369112 CEST44349706172.67.74.152192.168.2.5
                          May 15, 2024 13:46:52.233434916 CEST44349706172.67.74.152192.168.2.5
                          May 15, 2024 13:46:52.233498096 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:52.240032911 CEST49706443192.168.2.5172.67.74.152
                          May 15, 2024 13:46:52.970582008 CEST4970821192.168.2.5108.179.234.136
                          May 15, 2024 13:46:53.092200041 CEST2149708108.179.234.136192.168.2.5
                          May 15, 2024 13:46:53.092305899 CEST4970821192.168.2.5108.179.234.136
                          May 15, 2024 13:46:53.096545935 CEST4970821192.168.2.5108.179.234.136
                          May 15, 2024 13:46:53.214698076 CEST2149708108.179.234.136192.168.2.5
                          May 15, 2024 13:46:53.214787006 CEST4970821192.168.2.5108.179.234.136
                          May 15, 2024 13:46:53.218038082 CEST2149708108.179.234.136192.168.2.5
                          May 15, 2024 13:46:53.218103886 CEST4970821192.168.2.5108.179.234.136
                          May 15, 2024 13:46:53.218468904 CEST2149708108.179.234.136192.168.2.5
                          May 15, 2024 13:46:53.218513966 CEST4970821192.168.2.5108.179.234.136
                          TimestampSource PortDest PortSource IPDest IP
                          May 15, 2024 13:46:51.116761923 CEST6266553192.168.2.51.1.1.1
                          May 15, 2024 13:46:51.226393938 CEST53626651.1.1.1192.168.2.5
                          May 15, 2024 13:46:52.780751944 CEST5505853192.168.2.51.1.1.1
                          May 15, 2024 13:46:52.968645096 CEST53550581.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          May 15, 2024 13:46:51.116761923 CEST192.168.2.51.1.1.10xeedbStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                          May 15, 2024 13:46:52.780751944 CEST192.168.2.51.1.1.10x38e6Standard query (0)ftp.wapination.netA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          May 15, 2024 13:46:51.226393938 CEST1.1.1.1192.168.2.50xeedbNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                          May 15, 2024 13:46:51.226393938 CEST1.1.1.1192.168.2.50xeedbNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                          May 15, 2024 13:46:51.226393938 CEST1.1.1.1192.168.2.50xeedbNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                          May 15, 2024 13:46:52.968645096 CEST1.1.1.1192.168.2.50x38e6No error (0)ftp.wapination.netwapination.netCNAME (Canonical name)IN (0x0001)false
                          May 15, 2024 13:46:52.968645096 CEST1.1.1.1192.168.2.50x38e6No error (0)wapination.net108.179.234.136A (IP address)IN (0x0001)false
                          • api.ipify.org
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.549706172.67.74.1524435880C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe
                          TimestampBytes transferredDirectionData
                          2024-05-15 11:46:52 UTC155OUTGET / HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                          Host: api.ipify.org
                          Connection: Keep-Alive
                          2024-05-15 11:46:52 UTC211INHTTP/1.1 200 OK
                          Date: Wed, 15 May 2024 11:46:52 GMT
                          Content-Type: text/plain
                          Content-Length: 12
                          Connection: close
                          Vary: Origin
                          CF-Cache-Status: DYNAMIC
                          Server: cloudflare
                          CF-RAY: 8842e3d3acb64bff-MIA
                          2024-05-15 11:46:52 UTC12INData Raw: 38 34 2e 31 37 2e 34 30 2e 31 30 32
                          Data Ascii: 84.17.40.102


                          TimestampSource PortDest PortSource IPDest IPCommands
                          May 15, 2024 13:46:53.214698076 CEST2149708108.179.234.136192.168.2.5220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.
                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 06:46. Server port: 21.
                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 06:46. Server port: 21.220-IPv6 connections are also welcome on this server.
                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 06:46. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                          May 15, 2024 13:46:53.218038082 CEST2149708108.179.234.136192.168.2.5220 Logout.

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:13:46:49
                          Start date:15/05/2024
                          Path:C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe"
                          Imagebase:0x9d0000
                          File size:716'288 bytes
                          MD5 hash:52C3BF6B32A777A43CF7B59D0C0B6B46
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1984543642.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1986457181.0000000005A40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1984543642.000000000412D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:true

                          Target ID:3
                          Start time:13:46:50
                          Start date:15/05/2024
                          Path:C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Quotation_#432768#_pdf.scr.exe"
                          Imagebase:0x500000
                          File size:716'288 bytes
                          MD5 hash:52C3BF6B32A777A43CF7B59D0C0B6B46
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4459604058.00000000028AC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4458393564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4459604058.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4459604058.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:9.6%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:104
                            Total number of Limit Nodes:4
                            execution_graph 23966 10c4668 23967 10c467a 23966->23967 23968 10c4686 23967->23968 23972 10c4778 23967->23972 23977 10c3e28 23968->23977 23970 10c46a5 23973 10c479d 23972->23973 23981 10c4878 23973->23981 23985 10c4888 23973->23985 23978 10c3e33 23977->23978 23993 10c5c44 23978->23993 23980 10c6ff0 23980->23970 23982 10c48af 23981->23982 23983 10c498c 23982->23983 23989 10c44b0 23982->23989 23986 10c48af 23985->23986 23987 10c44b0 CreateActCtxA 23986->23987 23988 10c498c 23986->23988 23987->23988 23990 10c5918 CreateActCtxA 23989->23990 23992 10c59db 23990->23992 23994 10c5c4f 23993->23994 23997 10c5c64 23994->23997 23996 10c7095 23996->23980 23998 10c5c6f 23997->23998 24001 10c5c94 23998->24001 24000 10c717a 24000->23996 24002 10c5c9f 24001->24002 24005 10c5cc4 24002->24005 24004 10c726d 24004->24000 24006 10c5ccf 24005->24006 24008 10c856b 24006->24008 24012 10cac18 24006->24012 24007 10c85a9 24007->24004 24008->24007 24016 10ccd08 24008->24016 24021 10ccd17 24008->24021 24026 10cac3f 24012->24026 24031 10cac50 24012->24031 24013 10cac2e 24013->24008 24018 10ccd85 24016->24018 24017 10ccda0 24017->24007 24018->24017 24063 10ccec8 24018->24063 24067 10cceb7 24018->24067 24022 10ccd39 24021->24022 24023 10ccd5d 24022->24023 24024 10ccec8 3 API calls 24022->24024 24025 10cceb7 3 API calls 24022->24025 24023->24007 24024->24023 24025->24023 24027 10cac50 24026->24027 24035 10cad38 24027->24035 24043 10cad48 24027->24043 24028 10cac5f 24028->24013 24033 10cad38 2 API calls 24031->24033 24034 10cad48 2 API calls 24031->24034 24032 10cac5f 24032->24013 24033->24032 24034->24032 24036 10cad59 24035->24036 24037 10cad7c 24035->24037 24036->24037 24051 10cafe0 24036->24051 24055 10cafd1 24036->24055 24037->24028 24038 10cad74 24038->24037 24039 10caf80 GetModuleHandleW 24038->24039 24040 10cafad 24039->24040 24040->24028 24044 10cad59 24043->24044 24045 10cad7c 24043->24045 24044->24045 24049 10cafe0 LoadLibraryExW 24044->24049 24050 10cafd1 LoadLibraryExW 24044->24050 24045->24028 24046 10cad74 24046->24045 24047 10caf80 GetModuleHandleW 24046->24047 24048 10cafad 24047->24048 24048->24028 24049->24046 24050->24046 24052 10caff4 24051->24052 24054 10cb019 24052->24054 24059 10ca0d0 24052->24059 24054->24038 24056 10caff4 24055->24056 24057 10ca0d0 LoadLibraryExW 24056->24057 24058 10cb019 24056->24058 24057->24058 24058->24038 24060 10cb1c0 LoadLibraryExW 24059->24060 24062 10cb239 24060->24062 24062->24054 24064 10cced5 24063->24064 24065 10ccf0f 24064->24065 24071 10cba80 24064->24071 24065->24017 24068 10cced5 24067->24068 24069 10ccf0f 24068->24069 24070 10cba80 3 API calls 24068->24070 24069->24017 24070->24069 24072 10cba85 24071->24072 24074 10cdc28 24072->24074 24075 10cd27c 24072->24075 24074->24074 24076 10cd287 24075->24076 24077 10c5cc4 3 API calls 24076->24077 24078 10cdc97 24077->24078 24078->24074 24079 548fee0 PostMessageW 24080 548ff4c 24079->24080 24091 72b1f50 24092 72b1f8f FindCloseChangeNotification 24091->24092 24094 72b1fb7 24092->24094 24081 10ccfe0 24082 10ccfe1 GetCurrentProcess 24081->24082 24084 10cd078 GetCurrentThread 24082->24084 24085 10cd071 24082->24085 24086 10cd0ae 24084->24086 24087 10cd0b5 GetCurrentProcess 24084->24087 24085->24084 24086->24087 24090 10cd0eb 24087->24090 24088 10cd113 GetCurrentThreadId 24089 10cd144 24088->24089 24090->24088 24095 10cd630 24096 10cd631 DuplicateHandle 24095->24096 24097 10cd6c6 24096->24097

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 294 5486c50-5486c71 295 5486c78-5486d64 294->295 296 5486c73 294->296 298 5486d6a-5486ec1 295->298 299 5487596-54875be 295->299 296->295 343 5487564-5487593 298->343 344 5486ec7-5486f22 298->344 302 5487ca7-5487cb0 299->302 304 54875cc-54875d5 302->304 305 5487cb6-5487ccd 302->305 306 54875dc-54876d0 304->306 307 54875d7 304->307 325 54876fa 306->325 326 54876d2-54876de 306->326 307->306 330 5487700-5487720 325->330 328 54876e8-54876ee 326->328 329 54876e0-54876e6 326->329 331 54876f8 328->331 329->331 335 5487780-54877fa 330->335 336 5487722-548777b 330->336 331->330 355 54877fc-548784f 335->355 356 5487851-5487894 335->356 347 5487ca4 336->347 343->299 352 5486f24 344->352 353 5486f27-5486f32 344->353 347->302 352->353 354 5487476-548747c 353->354 358 5487482-54874ff 354->358 359 5486f37-5486f55 354->359 382 548789f-54878a5 355->382 356->382 399 548754e-5487554 358->399 361 5486fac-5486fc1 359->361 362 5486f57-5486f5b 359->362 366 5486fc8-5486fde 361->366 367 5486fc3 361->367 362->361 365 5486f5d-5486f68 362->365 371 5486f9e-5486fa4 365->371 368 5486fe0 366->368 369 5486fe5-5486ffc 366->369 367->366 368->369 373 5486ffe 369->373 374 5487003-5487019 369->374 376 5486f6a-5486f6e 371->376 377 5486fa6-5486fa7 371->377 373->374 380 548701b 374->380 381 5487020-5487027 374->381 378 5486f70 376->378 379 5486f74-5486f8c 376->379 383 548702a-548709b 377->383 378->379 386 5486f8e 379->386 387 5486f93-5486f9b 379->387 380->381 381->383 388 54878fc-5487908 382->388 389 548709d 383->389 390 54870b1-5487229 383->390 386->387 387->371 391 548790a-5487992 388->391 392 54878a7-54878c9 388->392 389->390 393 548709f-54870ab 389->393 400 548722b 390->400 401 548723f-548737a 390->401 422 5487b17-5487b20 391->422 395 54878cb 392->395 396 54878d0-54878f9 392->396 393->390 395->396 396->388 402 5487501-548754b 399->402 403 5487556-548755c 399->403 400->401 404 548722d-5487239 400->404 412 548737c-5487380 401->412 413 54873de-54873f3 401->413 402->399 403->343 404->401 412->413 417 5487382-5487391 412->417 415 54873fa-548741b 413->415 416 54873f5 413->416 419 548741d 415->419 420 5487422-5487441 415->420 416->415 421 54873d0-54873d6 417->421 419->420 426 5487448-5487468 420->426 427 5487443 420->427 428 54873d8-54873d9 421->428 429 5487393-5487397 421->429 424 5487b26-5487b81 422->424 425 5487997-54879ac 422->425 451 5487bb8-5487be2 424->451 452 5487b83-5487bb6 424->452 433 54879ae 425->433 434 54879b5-5487b0b 425->434 435 548746a 426->435 436 548746f 426->436 427->426 430 5487473 428->430 431 5487399-548739d 429->431 432 54873a1-54873c2 429->432 430->354 431->432 438 54873c9-54873cd 432->438 439 54873c4 432->439 433->434 440 5487a8a-5487aca 433->440 441 54879bb-54879fb 433->441 442 5487a00-5487a40 433->442 443 5487a45-5487a85 433->443 454 5487b11 434->454 435->436 436->430 438->421 439->438 440->454 441->454 442->454 443->454 460 5487beb-5487c7e 451->460 452->460 454->422 464 5487c85-5487c9d 460->464 464->347
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'jq$LC?;$TJoq$Tejq$pnq$xbmq
                            • API String ID: 0-1094910315
                            • Opcode ID: 58eb8dd3a287aa3504c483e888046a15cdd4d2b980b2add915242a71ed16582e
                            • Instruction ID: c9a5fde0fc7908e4144891ccb442e3b8dc1ce620af0bd14be3639e0dbbcde14e
                            • Opcode Fuzzy Hash: 58eb8dd3a287aa3504c483e888046a15cdd4d2b980b2add915242a71ed16582e
                            • Instruction Fuzzy Hash: 5FB2C075A00228CFDB65DF69C984ADDBBB2FF89304F1581E9D509AB225DB319E81CF40
                            Memory Dump Source
                            • Source File: 00000000.00000002.1987151767.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_72b0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cb45fb4194ce6c07e4f10e6c43f6d4a0a0e0c8feed666bd47f31950c02681fcb
                            • Instruction ID: b181330c97d7ffdc15bf9bf2646fb0adaa87a906b11b9da0a4475d977578e6fa
                            • Opcode Fuzzy Hash: cb45fb4194ce6c07e4f10e6c43f6d4a0a0e0c8feed666bd47f31950c02681fcb
                            • Instruction Fuzzy Hash: 0A32CCB0B1120A8FDB29DB69C460BEEB7F6AF89740F24446DE4469B390DB34ED01CB51
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 152c5f5824e028fe85f1780931e553d3ef380b8209b4f78bbac627d9e03104f0
                            • Instruction ID: ebb52f067f25fcfdf58cccb40cafc32fced75306779aa61d195b09957836fdc0
                            • Opcode Fuzzy Hash: 152c5f5824e028fe85f1780931e553d3ef380b8209b4f78bbac627d9e03104f0
                            • Instruction Fuzzy Hash: 65110671E006188BEB19DFABD8052DEBAF7BFC9300F14C07AD4196B258EB750856CA50
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f08857fc2a27e2c03fadc600a8c81e2bef3ef5a73423ffcb621d86609ad961ff
                            • Instruction ID: aa7480013bd37ea2e68c8b1d43dbf8aaf669956a1382911c29f1d0d44a0d2ecb
                            • Opcode Fuzzy Hash: f08857fc2a27e2c03fadc600a8c81e2bef3ef5a73423ffcb621d86609ad961ff
                            • Instruction Fuzzy Hash: 3411A471E046188BEB18DFABC8142DEFAF7BFC9300F14C07AD419AA258DB7409468B54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 465 10ccfd0-10ccfde 466 10ccfe0 465->466 467 10ccfe1-10cd06f GetCurrentProcess 465->467 466->467 471 10cd078-10cd0ac GetCurrentThread 467->471 472 10cd071-10cd077 467->472 473 10cd0ae-10cd0b4 471->473 474 10cd0b5-10cd0e9 GetCurrentProcess 471->474 472->471 473->474 475 10cd0eb-10cd0f1 474->475 476 10cd0f2-10cd10d call 10cd5b9 474->476 475->476 480 10cd113-10cd142 GetCurrentThreadId 476->480 481 10cd14b-10cd1ad 480->481 482 10cd144-10cd14a 480->482 482->481
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 010CD05E
                            • GetCurrentThread.KERNEL32 ref: 010CD09B
                            • GetCurrentProcess.KERNEL32 ref: 010CD0D8
                            • GetCurrentThreadId.KERNEL32 ref: 010CD131
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: a766a4efca7a98c8e40cb1143c0cb5bae32b4a812de5c8c1c011a0e237a18e93
                            • Instruction ID: 8a259603d305b0c22c74b20c88cbe2a0effcb68fd20a9cf719fca2020e1b9e82
                            • Opcode Fuzzy Hash: a766a4efca7a98c8e40cb1143c0cb5bae32b4a812de5c8c1c011a0e237a18e93
                            • Instruction Fuzzy Hash: 605166B09003498FDB18DFA9D948B9EBBF5FF88304F20816DE409A7260D7389844CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 489 10ccfe0-10cd06f GetCurrentProcess 494 10cd078-10cd0ac GetCurrentThread 489->494 495 10cd071-10cd077 489->495 496 10cd0ae-10cd0b4 494->496 497 10cd0b5-10cd0e9 GetCurrentProcess 494->497 495->494 496->497 498 10cd0eb-10cd0f1 497->498 499 10cd0f2-10cd10d call 10cd5b9 497->499 498->499 503 10cd113-10cd142 GetCurrentThreadId 499->503 504 10cd14b-10cd1ad 503->504 505 10cd144-10cd14a 503->505 505->504
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 010CD05E
                            • GetCurrentThread.KERNEL32 ref: 010CD09B
                            • GetCurrentProcess.KERNEL32 ref: 010CD0D8
                            • GetCurrentThreadId.KERNEL32 ref: 010CD131
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 0864afc25352e5b54378a97208eb0a0f9da126c196dacf3fc8b06faaeb7d7294
                            • Instruction ID: 717a35c591ac9c6e1faa8a77e293ece58839b929bf5bbb5ee20cb17688182910
                            • Opcode Fuzzy Hash: 0864afc25352e5b54378a97208eb0a0f9da126c196dacf3fc8b06faaeb7d7294
                            • Instruction Fuzzy Hash: 6B5136B09003498FDB18DFA9D948BAEBBF5FF88304F20816DE419A7260D7389944CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 612 10cad48-10cad57 613 10cad59-10cad66 call 10ca06c 612->613 614 10cad83-10cad87 612->614 620 10cad7c 613->620 621 10cad68 613->621 616 10cad89-10cad93 614->616 617 10cad9b-10caddc 614->617 616->617 623 10cadde-10cade6 617->623 624 10cade9-10cadf7 617->624 620->614 669 10cad6e call 10cafe0 621->669 670 10cad6e call 10cafd1 621->670 623->624 625 10cadf9-10cadfe 624->625 626 10cae1b-10cae1d 624->626 628 10cae09 625->628 629 10cae00-10cae07 call 10ca078 625->629 630 10cae20-10cae27 626->630 627 10cad74-10cad76 627->620 631 10caeb8-10caf36 627->631 632 10cae0b-10cae19 628->632 629->632 634 10cae29-10cae31 630->634 635 10cae34-10cae3b 630->635 662 10caf38 631->662 663 10caf39-10caf78 631->663 632->630 634->635 638 10cae3d-10cae45 635->638 639 10cae48-10cae51 call 10ca088 635->639 638->639 643 10cae5e-10cae63 639->643 644 10cae53-10cae5b 639->644 646 10cae65-10cae6c 643->646 647 10cae81-10cae85 643->647 644->643 646->647 648 10cae6e-10cae7e call 10ca098 call 10ca0a8 646->648 651 10cae8b-10cae8e 647->651 648->647 653 10cae90-10caeae 651->653 654 10caeb1-10caeb7 651->654 653->654 662->663 664 10caf7a-10caf7d 663->664 665 10caf80-10cafab GetModuleHandleW 663->665 664->665 666 10cafad-10cafb3 665->666 667 10cafb4-10cafc8 665->667 666->667 669->627 670->627
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 010CAF9E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 0df540f6fdb0abf589c1173450cc587acebf1460f4872d9ce8393d67efa23ad7
                            • Instruction ID: 157920cc0af9266d9e0c81749b225e3f140114729f716740c248a108c85409f2
                            • Opcode Fuzzy Hash: 0df540f6fdb0abf589c1173450cc587acebf1460f4872d9ce8393d67efa23ad7
                            • Instruction Fuzzy Hash: FC712270A00B09CFDB64DF69D44479ABBF5BF88700F108A6DD48A9BA50E735E849CF90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 671 10c590c-10c59d9 CreateActCtxA 673 10c59db-10c59e1 671->673 674 10c59e2-10c5a3c 671->674 673->674 681 10c5a3e-10c5a41 674->681 682 10c5a4b-10c5a4f 674->682 681->682 683 10c5a60 682->683 684 10c5a51-10c5a5d 682->684 686 10c5a61 683->686 684->683 686->686
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 010C59C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: fe363cd87a62a0eeb1cbd86624b8197790d54f337904a8f7c410b0f9be6a5c7a
                            • Instruction ID: fa226838c1f0e4e51b8b64f07c3bacfeb9e8c7c92ed6b498935746f81b317aa2
                            • Opcode Fuzzy Hash: fe363cd87a62a0eeb1cbd86624b8197790d54f337904a8f7c410b0f9be6a5c7a
                            • Instruction Fuzzy Hash: 73410FB4C00319CFDB24CFAAC884ACDBBF1BF49304F20816AD408AB260DB75694ACF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 687 10c44b0-10c59d9 CreateActCtxA 690 10c59db-10c59e1 687->690 691 10c59e2-10c5a3c 687->691 690->691 698 10c5a3e-10c5a41 691->698 699 10c5a4b-10c5a4f 691->699 698->699 700 10c5a60 699->700 701 10c5a51-10c5a5d 699->701 703 10c5a61 700->703 701->700 703->703
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 010C59C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 6fdb9004de2d9a79e8078384ded2d7abc52276b525eacda2aa54be6985ed02bf
                            • Instruction ID: e498a2125af12ec5973c7f9867663d0efed29f0ef86732e11ab0b0e3e770de00
                            • Opcode Fuzzy Hash: 6fdb9004de2d9a79e8078384ded2d7abc52276b525eacda2aa54be6985ed02bf
                            • Instruction Fuzzy Hash: 5641E2B4D00719CADB24DFAAC848ACEBBF5BF49704F20806AD408AB255DB756945CF90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 704 10cd629-10cd62e 705 10cd630 704->705 706 10cd631-10cd6c4 DuplicateHandle 704->706 705->706 707 10cd6cd-10cd6ea 706->707 708 10cd6c6-10cd6cc 706->708 708->707
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010CD6B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 38c43a7bcf8dd2e7eebfcbc2b1714a6dfa340dc3f6cab52c669c979e46e7feee
                            • Instruction ID: b49dce72eb0410ed504d92abd4c4e9c8f6bcdaad7902ccc9dd0422bd7ce40596
                            • Opcode Fuzzy Hash: 38c43a7bcf8dd2e7eebfcbc2b1714a6dfa340dc3f6cab52c669c979e46e7feee
                            • Instruction Fuzzy Hash: E821F8B59002489FDB10CF9AD584ADEFFF9FB48310F14842AE958A3350C378A944CFA5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 711 10cd630-10cd6c4 DuplicateHandle 713 10cd6cd-10cd6ea 711->713 714 10cd6c6-10cd6cc 711->714 714->713
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010CD6B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: ebc4d5ad37ccccd41a23bde5f265dfeae134bf02bb9c744bc2fee4a7d10098db
                            • Instruction ID: 124a35a87dfb979c17c4e27bb059c2eb3158ad1c3a62618566c661235d286dda
                            • Opcode Fuzzy Hash: ebc4d5ad37ccccd41a23bde5f265dfeae134bf02bb9c744bc2fee4a7d10098db
                            • Instruction Fuzzy Hash: C521D5B59002489FDB10DF9AD984ADEFFF9FB48310F14845AE958A3350D378A944CFA5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 717 72b1f48-72b1f4c 718 72b1f8f-72b1f95 717->718 719 72b1f4e-72b1f8d 717->719 720 72b1f9b-72b1f9e 718->720 721 72b1f97-72b1f9a 718->721 719->718 723 72b1fa4-72b1fb5 FindCloseChangeNotification 720->723 721->720 724 72b1fbe-72b1fe6 723->724 725 72b1fb7-72b1fbd 723->725 725->724
                            APIs
                            • FindCloseChangeNotification.KERNELBASE(?), ref: 072B1FA8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1987151767.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_72b0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: ChangeCloseFindNotification
                            • String ID:
                            • API String ID: 2591292051-0
                            • Opcode ID: 3aba042a90b61732b90b92da14b8eaa4bd24c6f3152740f16459e2295a3cd21e
                            • Instruction ID: 153ad7e58d9d3c139923ec748e7c57b081209de894dbeee5e950334fe2889982
                            • Opcode Fuzzy Hash: 3aba042a90b61732b90b92da14b8eaa4bd24c6f3152740f16459e2295a3cd21e
                            • Instruction Fuzzy Hash: D6218CB58003498FCB20DFA9D444BDEFFF5EB49350F24885AD658A7641D338A545CFA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 728 10ca0d0-10cb200 730 10cb208-10cb237 LoadLibraryExW 728->730 731 10cb202-10cb205 728->731 732 10cb239-10cb23f 730->732 733 10cb240-10cb25d 730->733 731->730 732->733
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010CB019,00000800,00000000,00000000), ref: 010CB22A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 9c79a0e216257812b8ed45181283cbff46936c2c3f52d421333df8a3b18a7f85
                            • Instruction ID: aa11e9359d1d9c2b57db6ac889a6e139815dad8b795c729b8579d6ba289c5e30
                            • Opcode Fuzzy Hash: 9c79a0e216257812b8ed45181283cbff46936c2c3f52d421333df8a3b18a7f85
                            • Instruction Fuzzy Hash: F01126B68003088FDB10DF9AD448ADEFFF9EB48710F10846EE559A7250C379A545CFA5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 736 10cb1b9-10cb200 737 10cb208-10cb237 LoadLibraryExW 736->737 738 10cb202-10cb205 736->738 739 10cb239-10cb23f 737->739 740 10cb240-10cb25d 737->740 738->737 739->740
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010CB019,00000800,00000000,00000000), ref: 010CB22A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: b41980c8b2a0d89e258cd528b8663010d5571fd4472121a7b9fe551104ef7985
                            • Instruction ID: c185578beee28804755e4ec0f35696b007403963b7f1644705ea3e063f7c000f
                            • Opcode Fuzzy Hash: b41980c8b2a0d89e258cd528b8663010d5571fd4472121a7b9fe551104ef7985
                            • Instruction Fuzzy Hash: 891123B6C003088FDB10DFAAD844ADEFBF5EB88720F10846ED959A7210C379A545CFA5
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 010CAF9E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: e13d97101e27c3bedf11638fc444981dfda6ae7fbaccec6d7fdb929349869d69
                            • Instruction ID: b6cf951c4142e324d84091b31d8c859084d2ae4d078394bbc8235e7cd7839945
                            • Opcode Fuzzy Hash: e13d97101e27c3bedf11638fc444981dfda6ae7fbaccec6d7fdb929349869d69
                            • Instruction Fuzzy Hash: 701140B5C00249CFCB10CF9AD444ADEFBF8EF88314F10846AD858A3240D378A545CFA1
                            APIs
                            • FindCloseChangeNotification.KERNELBASE(?), ref: 072B1FA8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1987151767.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_72b0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: ChangeCloseFindNotification
                            • String ID:
                            • API String ID: 2591292051-0
                            • Opcode ID: 5ac15c86690d9ce5c5c297aa589bca5789fe957ed1d22a0bc247922cade30b01
                            • Instruction ID: d23648d186206a2d5816a73c5824805b81d855d9e2cf3b7b61ef1053622cf342
                            • Opcode Fuzzy Hash: 5ac15c86690d9ce5c5c297aa589bca5789fe957ed1d22a0bc247922cade30b01
                            • Instruction Fuzzy Hash: 271133B58003498FCB20DF9AC544BDEFBF4EB48320F10842AD918A7340C338A544CFA5
                            APIs
                            • PostMessageW.USER32(?,?,?,?), ref: 0548FF3D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: MessagePost
                            • String ID:
                            • API String ID: 410705778-0
                            • Opcode ID: 02bae6ae301566c83b394a1552a48418cf3f537e5dbbbde9e733fdb40eca3e17
                            • Instruction ID: 99c33a50e7e3e2ea3179d48b96c9a6ec4915bd72c6fe6bd9de4a6aa07f2553c7
                            • Opcode Fuzzy Hash: 02bae6ae301566c83b394a1552a48418cf3f537e5dbbbde9e733fdb40eca3e17
                            • Instruction Fuzzy Hash: 821103B58003489FCB10DF9AD844BDEFBF8FB48310F10845AE518A3240C379A544CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982126142.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_106d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9359631de9f2168074af50c1668e34b9c031e7cbb4e74aef5b6952c7169f08f9
                            • Instruction ID: 438603067383d736d935190bcc6b9deec772ee1a94b3a4516e0538b69d486ff5
                            • Opcode Fuzzy Hash: 9359631de9f2168074af50c1668e34b9c031e7cbb4e74aef5b6952c7169f08f9
                            • Instruction Fuzzy Hash: 83214871600244DFDB05DF58C9C0F5ABFA9FB98314F20C1A9E9890B256C73AE806C7A1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982161759.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_107d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cf3299bbfc34e1298bc89c72634ae602b3d61b0130a777600e4d097a358473f6
                            • Instruction ID: f47e9ca24750877ac0bc84bbbb4142bc2116cbd39f1073141cfa6a47df818eb8
                            • Opcode Fuzzy Hash: cf3299bbfc34e1298bc89c72634ae602b3d61b0130a777600e4d097a358473f6
                            • Instruction Fuzzy Hash: C021F571A04204EFDB05DF98D5C0B26BBA5FF94324F24C5ADD9894B256C33AD407CB65
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982161759.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_107d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20447a5d8f39c6028ddc56c260ad931906abc6597a9e6149c1e299a08cdd08b0
                            • Instruction ID: ad13960cc0d70a776f055616734af62c6b8569ad9da0c1ad56f7504374f5bb2d
                            • Opcode Fuzzy Hash: 20447a5d8f39c6028ddc56c260ad931906abc6597a9e6149c1e299a08cdd08b0
                            • Instruction Fuzzy Hash: 44212571A04200DFCB16DF68D980B16BFA5FF84314F20C5ADE9890B256C33AD407CBA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982161759.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_107d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4405460ae52a293c97faf1d4fc2adb2248620e9783e3a8543f375a8687f46e17
                            • Instruction ID: 9098359b5d9d2b8aaa30f2e2ac662886be6ee29c8dbc5f4a1f9c2297eec3ffc5
                            • Opcode Fuzzy Hash: 4405460ae52a293c97faf1d4fc2adb2248620e9783e3a8543f375a8687f46e17
                            • Instruction Fuzzy Hash: 272165755093808FD713CF64D594715BFB1EF46214F28C5DAD8898F667C33A980ACBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982126142.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_106d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                            • Instruction ID: c495165a07be342fbee8c0a19b3a496aa640a60f98b9cbedfbdea9aa7040785f
                            • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                            • Instruction Fuzzy Hash: 19110372504240CFDB02CF44D5C4B56BFB1FB88324F24C6A9D9890B257C33AE85ACBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982161759.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_107d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                            • Instruction ID: e13e34b5ec51edd3c26ada1358e668545c2c1f6abd6984447acc7fcb7604cc5a
                            • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                            • Instruction Fuzzy Hash: 6611BB75904280DFDB02CF54C5C4B15BFA1FF84224F28C6A9D9894B296C33AD40BCB62
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982126142.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_106d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4066cff972461121eb2b7a73fe436369ec9c4708fd70d7809267cb8d45b965f0
                            • Instruction ID: e3eee54d07cee075101ab746dafbd3031eb56026d9d0ef7450bab39eeb375629
                            • Opcode Fuzzy Hash: 4066cff972461121eb2b7a73fe436369ec9c4708fd70d7809267cb8d45b965f0
                            • Instruction Fuzzy Hash: A701F7312043849AE7618E99CC84B6AFFDCFF55320F18C46AEDC80A296D23D9840CB72
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982126142.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_106d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6202b8c1ea3409ce8ec8a8561f3a76cae1d2114efe7f1aadcb044e72a542c270
                            • Instruction ID: f1dcd9c9e665f01e71d2719b11c1bcb0fcb406c8686104f3a4c0197cf721983d
                            • Opcode Fuzzy Hash: 6202b8c1ea3409ce8ec8a8561f3a76cae1d2114efe7f1aadcb044e72a542c270
                            • Instruction Fuzzy Hash: C2F0C2715043849EE7218E0ADC84B62FFECFF55624F18C49AED884B396D2799844CBB1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: TJoq$Tejq$xbmq
                            • API String ID: 0-903294719
                            • Opcode ID: 805a46b0003557e86668ecc291beb2cbab37507707361c5329abaf286b311090
                            • Instruction ID: a78843f58e0e31ed29cfe26608fe7acbd22d3125ce0377ad38bef45f1636a3b2
                            • Opcode Fuzzy Hash: 805a46b0003557e86668ecc291beb2cbab37507707361c5329abaf286b311090
                            • Instruction Fuzzy Hash: EFC17475E006188FDB58DF6AC954ADDBBF2BF89300F14C1A9D809AB365DB309A85CF50
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'jq
                            • API String ID: 0-3676250632
                            • Opcode ID: dce06871ff8ecd9207856d4aee851d2f5df124f1128ee90514a332f3bbd0c7dc
                            • Instruction ID: 8c5cab4b4b1737e8c6410022f8632d16b00bc2a422e8bc010e057b08219f89a1
                            • Opcode Fuzzy Hash: dce06871ff8ecd9207856d4aee851d2f5df124f1128ee90514a332f3bbd0c7dc
                            • Instruction Fuzzy Hash: A1611A70E40209CFDB08EF6BE951A9EBBF6BF98304F14C529D0089B269DB745949CF81
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'jq
                            • API String ID: 0-3676250632
                            • Opcode ID: 3e12020a80fdd3ec7a1e33579c0f1e8608b18957cffd9d518e7a8da9a533f585
                            • Instruction ID: b2cca145e6862ae9f8435de38e2970ef031055e85aa85c631cd11bfd6d8e382f
                            • Opcode Fuzzy Hash: 3e12020a80fdd3ec7a1e33579c0f1e8608b18957cffd9d518e7a8da9a533f585
                            • Instruction Fuzzy Hash: 6C610B70E40209CFDB08EF6BE951A9EBBF6BF98304F14C529D0049B269DB745949CF91
                            Memory Dump Source
                            • Source File: 00000000.00000002.1982283531.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10c0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 429c13a321ab6ff14931ac6b653e12b642eadc5532da4afc8142218f7aa9abec
                            • Instruction ID: ab8305016f23e929dc801d505aea2f1abdf4e9cde4650698abb1e748b13fdba2
                            • Opcode Fuzzy Hash: 429c13a321ab6ff14931ac6b653e12b642eadc5532da4afc8142218f7aa9abec
                            • Instruction Fuzzy Hash: 0DA14B32A002168FCF19DFB9C94459EBBB2FF85700B1581AEE906AB265DB31D945CF41
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 77fee1646c61edad33aa18119aeed2bcf7781344e94cf84ffaae08eac507a3fc
                            • Instruction ID: 4adae8486f87f14e168b51716d0a50fade49ce625ed9b3d0cb542130c07325f5
                            • Opcode Fuzzy Hash: 77fee1646c61edad33aa18119aeed2bcf7781344e94cf84ffaae08eac507a3fc
                            • Instruction Fuzzy Hash: 20414671D05A188BEB5CCF6B9D406DEFAF3AFC9301F54C1BA980CAA255DB3049469F11
                            Memory Dump Source
                            • Source File: 00000000.00000002.1985803064.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5480000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 010126d1bac00afa0fc67c839fba2c5fa707998ee627e9505c29a7798ac433da
                            • Instruction ID: de71a92c873471bc91a39ddd5918abf6a6250fc21b0bc07a735a75d51479139c
                            • Opcode Fuzzy Hash: 010126d1bac00afa0fc67c839fba2c5fa707998ee627e9505c29a7798ac433da
                            • Instruction Fuzzy Hash: CC415571E05A588BEB5CCF6B9D406DAFBF3AFC9301F14C1BA884CAA225DB3005469F00

                            Execution Graph

                            Execution Coverage:11.2%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:131
                            Total number of Limit Nodes:15
                            execution_graph 35187 2690848 35188 269084e 35187->35188 35189 269091b 35188->35189 35192 6591768 35188->35192 35196 269133f 35188->35196 35193 6591777 35192->35193 35201 6590fa4 35193->35201 35197 269132e 35196->35197 35199 2691343 35196->35199 35197->35188 35198 2691440 35198->35188 35199->35198 35257 2697e69 35199->35257 35202 6590faf 35201->35202 35205 6592704 35202->35205 35204 659311e 35204->35204 35206 659270f 35205->35206 35207 6593844 35206->35207 35209 65954c8 35206->35209 35207->35204 35210 65954e9 35209->35210 35211 659550d 35210->35211 35213 6595678 35210->35213 35211->35207 35214 6595685 35213->35214 35215 65956be 35214->35215 35217 6593610 35214->35217 35215->35211 35218 659361b 35217->35218 35220 6595730 35218->35220 35221 6594188 35218->35221 35220->35220 35222 6594193 35221->35222 35228 6594198 35222->35228 35224 659579f 35232 659ac20 35224->35232 35237 659ac38 35224->35237 35225 65957d9 35225->35220 35229 65941a3 35228->35229 35230 6596ba0 35229->35230 35231 65954c8 2 API calls 35229->35231 35230->35224 35231->35230 35233 659ac38 35232->35233 35234 659ac75 35233->35234 35243 659aeb0 35233->35243 35246 659aea0 35233->35246 35234->35225 35239 659ac69 35237->35239 35240 659acb5 35237->35240 35238 659ac75 35238->35225 35239->35238 35241 659aeb0 2 API calls 35239->35241 35242 659aea0 2 API calls 35239->35242 35240->35225 35241->35240 35242->35240 35250 659aef0 35243->35250 35244 659aeba 35244->35234 35247 659aeb0 35246->35247 35249 659aef0 2 API calls 35247->35249 35248 659aeba 35248->35234 35249->35248 35251 659aef5 35250->35251 35252 659af34 35251->35252 35256 659b198 LoadLibraryExW 35251->35256 35252->35244 35253 659af2c 35253->35252 35254 659b138 GetModuleHandleW 35253->35254 35255 659b165 35254->35255 35255->35244 35256->35253 35258 2697e73 35257->35258 35259 2697f29 35258->35259 35262 65afa20 35258->35262 35266 65afa11 35258->35266 35259->35199 35264 65afa35 35262->35264 35263 65afc4a 35263->35259 35264->35263 35265 65afc60 GlobalMemoryStatusEx 35264->35265 35265->35264 35267 65afa1a 35266->35267 35268 65afc4a 35267->35268 35269 65afc60 GlobalMemoryStatusEx 35267->35269 35268->35259 35269->35267 35270 6592ab8 DuplicateHandle 35271 6592b4e 35270->35271 35286 c8d030 35287 c8d048 35286->35287 35288 c8d0a2 35287->35288 35293 659d288 35287->35293 35297 659d277 35287->35297 35301 659a494 35287->35301 35310 659dfd8 35287->35310 35294 659d2ae 35293->35294 35295 659a494 CallWindowProcW 35294->35295 35296 659d2cf 35295->35296 35296->35288 35298 659d285 35297->35298 35299 659a494 CallWindowProcW 35298->35299 35300 659d2cf 35299->35300 35300->35288 35302 659a49f 35301->35302 35303 659e049 35302->35303 35305 659e039 35302->35305 35306 659e047 35303->35306 35335 659a5bc 35303->35335 35319 659e578 35305->35319 35324 659e644 35305->35324 35330 659e568 35305->35330 35312 659dfe8 35310->35312 35311 659e049 35313 659a5bc CallWindowProcW 35311->35313 35315 659e047 35311->35315 35312->35311 35314 659e039 35312->35314 35313->35315 35316 659e578 CallWindowProcW 35314->35316 35317 659e568 CallWindowProcW 35314->35317 35318 659e644 CallWindowProcW 35314->35318 35316->35315 35317->35315 35318->35315 35321 659e58c 35319->35321 35320 659e618 35320->35306 35339 659e630 35321->35339 35342 659e620 35321->35342 35325 659e602 35324->35325 35326 659e652 35324->35326 35328 659e630 CallWindowProcW 35325->35328 35329 659e620 CallWindowProcW 35325->35329 35327 659e618 35327->35306 35328->35327 35329->35327 35331 659e578 35330->35331 35333 659e630 CallWindowProcW 35331->35333 35334 659e620 CallWindowProcW 35331->35334 35332 659e618 35332->35306 35333->35332 35334->35332 35336 659a5c7 35335->35336 35337 659f8ba CallWindowProcW 35336->35337 35338 659f869 35336->35338 35337->35338 35338->35306 35340 659e641 35339->35340 35346 659f7f0 35339->35346 35340->35320 35343 659e630 35342->35343 35344 659e641 35343->35344 35345 659f7f0 CallWindowProcW 35343->35345 35344->35320 35345->35344 35347 659a5bc CallWindowProcW 35346->35347 35348 659f80a 35347->35348 35348->35340 35272 6592870 35273 65928b6 GetCurrentProcess 35272->35273 35275 6592908 GetCurrentThread 35273->35275 35276 6592901 35273->35276 35277 659293e 35275->35277 35278 6592945 GetCurrentProcess 35275->35278 35276->35275 35277->35278 35281 659297b 35278->35281 35279 65929a3 GetCurrentThreadId 35280 65929d4 35279->35280 35281->35279 35282 659d0d0 35283 659d138 CreateWindowExW 35282->35283 35285 659d1f4 35283->35285

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 527 65a3130-65a3151 528 65a3153-65a3156 527->528 529 65a3158-65a3177 528->529 530 65a317c-65a317f 528->530 529->530 531 65a3920-65a3922 530->531 532 65a3185-65a31a4 530->532 533 65a3929-65a392c 531->533 534 65a3924 531->534 540 65a31bd-65a31c7 532->540 541 65a31a6-65a31a9 532->541 533->528 537 65a3932-65a393b 533->537 534->533 545 65a31cd-65a31dc 540->545 541->540 542 65a31ab-65a31bb 541->542 542->545 653 65a31de call 65a3948 545->653 654 65a31de call 65a3950 545->654 546 65a31e3-65a31e8 547 65a31ea-65a31f0 546->547 548 65a31f5-65a34d2 546->548 547->537 569 65a34d8-65a3587 548->569 570 65a3912-65a391f 548->570 579 65a3589-65a35ae 569->579 580 65a35b0 569->580 582 65a35b9-65a35cc 579->582 580->582 584 65a38f9-65a3905 582->584 585 65a35d2-65a35f4 582->585 584->569 586 65a390b 584->586 585->584 588 65a35fa-65a3604 585->588 586->570 588->584 589 65a360a-65a3615 588->589 589->584 590 65a361b-65a36f1 589->590 602 65a36ff-65a372f 590->602 603 65a36f3-65a36f5 590->603 607 65a373d-65a3749 602->607 608 65a3731-65a3733 602->608 603->602 609 65a374b-65a374f 607->609 610 65a37a9-65a37ad 607->610 608->607 609->610 613 65a3751-65a377b 609->613 611 65a38ea-65a38f3 610->611 612 65a37b3-65a37ef 610->612 611->584 611->590 623 65a37fd-65a380b 612->623 624 65a37f1-65a37f3 612->624 620 65a3789-65a37a6 613->620 621 65a377d-65a377f 613->621 620->610 621->620 627 65a380d-65a3818 623->627 628 65a3822-65a382d 623->628 624->623 627->628 631 65a381a 627->631 632 65a382f-65a3835 628->632 633 65a3845-65a3856 628->633 631->628 634 65a3839-65a383b 632->634 635 65a3837 632->635 637 65a3858-65a385e 633->637 638 65a386e-65a387a 633->638 634->633 635->633 639 65a3862-65a3864 637->639 640 65a3860 637->640 642 65a387c-65a3882 638->642 643 65a3892-65a38e3 638->643 639->638 640->638 644 65a3886-65a3888 642->644 645 65a3884 642->645 643->611 644->643 645->643 653->546 654->546
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq$$jq$$jq
                            • API String ID: 0-3356825164
                            • Opcode ID: de53efe8c4b27bf73f92a332b58d638ed0df8a07f9c0f26fa28ed98264401ffe
                            • Instruction ID: 0bdb3ace2fa8222f5c6fe30ed938b281e6f671f278ae679e1c921040329ca422
                            • Opcode Fuzzy Hash: de53efe8c4b27bf73f92a332b58d638ed0df8a07f9c0f26fa28ed98264401ffe
                            • Instruction Fuzzy Hash: 4C321F30E1071ACFCB14EF65D95459DB7B6FFC9300F2586AAD409AB264EB30A985CF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1289 65a7e40-65a7e5e 1290 65a7e60-65a7e63 1289->1290 1291 65a7e70-65a7e73 1290->1291 1292 65a7e65-65a7e6f 1290->1292 1293 65a7e96-65a7e99 1291->1293 1294 65a7e75-65a7e91 1291->1294 1295 65a7e9b-65a7ea9 1293->1295 1296 65a7eb0-65a7eb3 1293->1296 1294->1293 1303 65a7eab 1295->1303 1304 65a7ee6-65a7efc 1295->1304 1297 65a7ed4-65a7ed6 1296->1297 1298 65a7eb5-65a7ecf 1296->1298 1301 65a7ed8 1297->1301 1302 65a7edd-65a7ee0 1297->1302 1298->1297 1301->1302 1302->1290 1302->1304 1303->1296 1309 65a7f02-65a7f0b 1304->1309 1310 65a8117-65a8121 1304->1310 1311 65a8122-65a8157 1309->1311 1312 65a7f11-65a7f2e 1309->1312 1315 65a8159-65a815c 1311->1315 1321 65a8104-65a8111 1312->1321 1322 65a7f34-65a7f5c 1312->1322 1317 65a8209-65a820c 1315->1317 1318 65a8162-65a816e 1315->1318 1319 65a820e-65a822a 1317->1319 1320 65a822f-65a8232 1317->1320 1325 65a8179-65a817b 1318->1325 1319->1320 1323 65a8238-65a8247 1320->1323 1324 65a8467-65a8469 1320->1324 1321->1309 1321->1310 1322->1321 1345 65a7f62-65a7f6b 1322->1345 1340 65a8249-65a8264 1323->1340 1341 65a8266-65a82aa 1323->1341 1328 65a846b 1324->1328 1329 65a8470-65a8473 1324->1329 1330 65a817d-65a8183 1325->1330 1331 65a8193-65a8197 1325->1331 1328->1329 1329->1315 1335 65a8479-65a8482 1329->1335 1336 65a8187-65a8189 1330->1336 1337 65a8185 1330->1337 1332 65a8199-65a81a3 1331->1332 1333 65a81a5 1331->1333 1338 65a81aa-65a81ac 1332->1338 1333->1338 1336->1331 1337->1331 1343 65a81ae-65a81b1 1338->1343 1344 65a81c3-65a81fc 1338->1344 1340->1341 1349 65a843b-65a8451 1341->1349 1350 65a82b0-65a82c1 1341->1350 1343->1335 1344->1323 1369 65a81fe-65a8208 1344->1369 1345->1311 1348 65a7f71-65a7f8d 1345->1348 1357 65a80f2-65a80fe 1348->1357 1358 65a7f93-65a7fbd 1348->1358 1349->1324 1359 65a8426-65a8435 1350->1359 1360 65a82c7-65a82e4 1350->1360 1357->1321 1357->1345 1372 65a80e8-65a80ed 1358->1372 1373 65a7fc3-65a7feb 1358->1373 1359->1349 1359->1350 1360->1359 1371 65a82ea-65a83e0 call 65a6668 1360->1371 1422 65a83ee 1371->1422 1423 65a83e2-65a83ec 1371->1423 1372->1357 1373->1372 1379 65a7ff1-65a801f 1373->1379 1379->1372 1385 65a8025-65a802e 1379->1385 1385->1372 1386 65a8034-65a8066 1385->1386 1394 65a8068-65a806c 1386->1394 1395 65a8071-65a808d 1386->1395 1394->1372 1396 65a806e 1394->1396 1395->1357 1397 65a808f-65a80e6 call 65a6668 1395->1397 1396->1395 1397->1357 1424 65a83f3-65a83f5 1422->1424 1423->1424 1424->1359 1425 65a83f7-65a83fc 1424->1425 1426 65a840a 1425->1426 1427 65a83fe-65a8408 1425->1427 1428 65a840f-65a8411 1426->1428 1427->1428 1428->1359 1429 65a8413-65a841f 1428->1429 1429->1359
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq
                            • API String ID: 0-3720491408
                            • Opcode ID: 6e33c0403d535080502fda89c36199926d5a823b808549036b51131b9a2f5baf
                            • Instruction ID: 590bc4af70398d7048a6b3740e78a627b074aa1da5c49f17ee7d3ad7f015fd4a
                            • Opcode Fuzzy Hash: 6e33c0403d535080502fda89c36199926d5a823b808549036b51131b9a2f5baf
                            • Instruction Fuzzy Hash: 8B02AD30B002058FDB58DF64E990AAEB7F6FF84304F248569D416AB395DB35ED46CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $
                            • API String ID: 0-3993045852
                            • Opcode ID: c061874df15bf43634d75e9120435b46df8232656885b8de7b66c7faeeb146c6
                            • Instruction ID: 20c97520dbe32ddda76f9c23256add4f7d969e3931c3026fbe3e99df102914ec
                            • Opcode Fuzzy Hash: c061874df15bf43634d75e9120435b46df8232656885b8de7b66c7faeeb146c6
                            • Instruction Fuzzy Hash: C122D271E003159FDF60DBA4C590AAEBBB2FF84320F24846AD40AAB355EA35DD45CF91
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 555fdeee0d853835cd5bf3b622403790ae10c3a461361148c71b12eede4a41dc
                            • Instruction ID: 4e596a22abcdf139aacc9b96610439ced70eca5b0fb56c45b295450e50e1af32
                            • Opcode Fuzzy Hash: 555fdeee0d853835cd5bf3b622403790ae10c3a461361148c71b12eede4a41dc
                            • Instruction Fuzzy Hash: 8A328D34A002099FDF54DB68D980BAEB7B6FF88310F148969E405EB355DB35EC45CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 064d3182fe11351b390bf28b0ce6e1324fbb20c98dc7e4d0ee5e82f9c3ced5b9
                            • Instruction ID: 34129cf8d5c591b403bb1c92c507103ecf5f159c8fa28cbc9bb70619becc1684
                            • Opcode Fuzzy Hash: 064d3182fe11351b390bf28b0ce6e1324fbb20c98dc7e4d0ee5e82f9c3ced5b9
                            • Instruction Fuzzy Hash: 5B126070E102098FEFA4DB68D5807ADB7B6FB89310F64892AE405DB395DA35DC81CB91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 655 65ab710-65ab730 656 65ab732-65ab735 655->656 657 65ab749-65ab74c 656->657 658 65ab737-65ab73e 656->658 661 65aba4e-65aba57 657->661 662 65ab752-65ab755 657->662 659 65ab899-65ab8a2 658->659 660 65ab744 658->660 667 65ab8a7-65ab8aa 659->667 660->657 665 65aba5d 661->665 666 65ab8d5-65ab8de 661->666 663 65ab75b-65ab75e 662->663 664 65aba13-65aba14 662->664 668 65ab768-65ab76b 663->668 669 65ab760-65ab763 663->669 670 65aba19-65aba1c 664->670 673 65aba62-65aba65 665->673 671 65abaab-65abae6 666->671 672 65ab8e4-65ab8eb 666->672 674 65ab8ba-65ab8bd 667->674 675 65ab8ac-65ab8b5 667->675 678 65ab778-65ab77b 668->678 679 65ab76d-65ab773 668->679 669->668 676 65aba1e-65aba22 670->676 677 65aba33-65aba36 670->677 702 65abae8-65abaeb 671->702 680 65ab8f0-65ab8f3 672->680 681 65aba78-65aba7b 673->681 682 65aba67-65aba6b 673->682 683 65ab8bf-65ab8cb 674->683 684 65ab8d0-65ab8d3 674->684 675->674 676->671 685 65aba28-65aba2e 676->685 686 65aba38-65aba3e 677->686 687 65aba49-65aba4c 677->687 688 65ab77d-65ab77f 678->688 689 65ab782-65ab785 678->689 679->678 691 65ab931-65ab934 680->691 692 65ab8f5-65ab90a 680->692 694 65aba8e-65aba90 681->694 695 65aba7d-65aba81 681->695 682->671 693 65aba6d-65aba73 682->693 683->684 684->666 684->680 685->677 699 65ab82d-65ab833 686->699 700 65aba44 686->700 687->661 687->673 688->689 689->686 701 65ab78b-65ab78e 689->701 691->664 703 65ab93a-65ab93d 691->703 692->671 716 65ab910-65ab92c 692->716 693->681 697 65aba92 694->697 698 65aba97-65aba9a 694->698 695->671 704 65aba83-65aba89 695->704 697->698 698->656 705 65abaa0-65abaaa 698->705 699->671 711 65ab839-65ab840 699->711 700->687 706 65ab79e-65ab7a1 701->706 707 65ab790-65ab799 701->707 708 65abaf1-65abb19 702->708 709 65abd57-65abd5a 702->709 712 65ab93f-65ab98d call 65a6668 703->712 713 65ab992-65ab995 703->713 704->694 706->664 717 65ab7a7-65ab7aa 706->717 707->706 768 65abb1b-65abb1e 708->768 769 65abb23-65abb67 708->769 714 65abd5c-65abd78 709->714 715 65abd7d-65abd7f 709->715 718 65ab845-65ab848 711->718 712->713 719 65ab9b8-65ab9bb 713->719 720 65ab997-65ab9b3 713->720 714->715 727 65abd81 715->727 728 65abd86-65abd89 715->728 716->691 725 65ab7ac-65ab7b0 717->725 726 65ab7d1-65ab7d4 717->726 729 65ab86a-65ab86d 718->729 730 65ab84a-65ab865 718->730 722 65ab9cb-65ab9ce 719->722 723 65ab9bd-65ab9c6 719->723 720->719 740 65ab9d0-65ab9d4 722->740 741 65ab9f1-65ab9f4 722->741 723->722 725->671 735 65ab7b6-65ab7c6 725->735 738 65ab7e6-65ab7e9 726->738 739 65ab7d6 726->739 727->728 728->702 736 65abd8f-65abd98 728->736 732 65ab86f-65ab873 729->732 733 65ab894-65ab897 729->733 730->729 732->671 745 65ab879-65ab889 732->745 733->659 733->667 735->740 761 65ab7cc 735->761 746 65ab7eb-65ab800 738->746 747 65ab828-65ab82b 738->747 755 65ab7de-65ab7e1 739->755 740->671 748 65ab9da-65ab9ea 740->748 749 65aba01-65aba04 741->749 750 65ab9f6-65ab9fc 741->750 745->725 765 65ab88f 745->765 746->671 766 65ab806-65ab823 746->766 747->699 747->718 748->664 767 65ab9ec 748->767 756 65aba0e-65aba11 749->756 757 65aba06-65aba0b 749->757 750->749 755->738 756->664 756->670 757->756 761->726 765->733 766->747 767->741 768->736 777 65abd4c-65abd56 769->777 778 65abb6d-65abb76 769->778 780 65abb7c-65abbe8 call 65a6668 778->780 781 65abd42-65abd47 778->781 789 65abbee-65abbf3 780->789 790 65abce2-65abcf7 780->790 781->777 791 65abc0f 789->791 792 65abbf5-65abbfb 789->792 790->781 796 65abc11-65abc17 791->796 794 65abbfd-65abbff 792->794 795 65abc01-65abc03 792->795 797 65abc0d 794->797 795->797 798 65abc19-65abc1f 796->798 799 65abc2c-65abc39 796->799 797->796 800 65abccd-65abcdc 798->800 801 65abc25 798->801 805 65abc3b-65abc41 799->805 806 65abc51-65abc5e 799->806 800->789 800->790 801->799 802 65abc60-65abc6d 801->802 803 65abc94-65abca1 801->803 813 65abc6f-65abc75 802->813 814 65abc85-65abc92 802->814 815 65abcb9-65abcc6 803->815 816 65abca3-65abca9 803->816 808 65abc43 805->808 809 65abc45-65abc47 805->809 806->800 808->806 809->806 817 65abc79-65abc7b 813->817 818 65abc77 813->818 814->800 815->800 819 65abcab 816->819 820 65abcad-65abcaf 816->820 817->814 818->814 819->815 820->815
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq$$jq$$jq
                            • API String ID: 0-3356825164
                            • Opcode ID: 17bb0d5ff77537c819561f599ef6c2e5030c8420ad389a71d84ef2dfd0421565
                            • Instruction ID: cf1336e1b1d51b4ad32ec4839001d40c5bb4ffe05cb88dfc9cda10ab7b2418a8
                            • Opcode Fuzzy Hash: 17bb0d5ff77537c819561f599ef6c2e5030c8420ad389a71d84ef2dfd0421565
                            • Instruction Fuzzy Hash: 5E027A30E0030A8FDBA4CF68D590AADB7B2FF85310F64896AE415EB255DB35EC45CB91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 823 6592862-65928ff GetCurrentProcess 828 6592908-659293c GetCurrentThread 823->828 829 6592901-6592907 823->829 830 659293e-6592944 828->830 831 6592945-6592979 GetCurrentProcess 828->831 829->828 830->831 832 659297b-6592981 831->832 833 6592982-659299a 831->833 832->833 846 659299d call 6592e30 833->846 847 659299d call 6592e20 833->847 848 659299d call 6592a55 833->848 837 65929a3-65929d2 GetCurrentThreadId 838 65929db-6592a3d 837->838 839 65929d4-65929da 837->839 839->838 846->837 847->837 848->837
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 065928EE
                            • GetCurrentThread.KERNEL32 ref: 0659292B
                            • GetCurrentProcess.KERNEL32 ref: 06592968
                            • GetCurrentThreadId.KERNEL32 ref: 065929C1
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 072d5fd0c72d2952b0cce73637c1232c1750a199c9c8f9fcea5bdc6bf7c14133
                            • Instruction ID: 531943c4e1a43d1fee69c2e83bb9de768973a3e1e7a14ccf9304d1e4e56a0c82
                            • Opcode Fuzzy Hash: 072d5fd0c72d2952b0cce73637c1232c1750a199c9c8f9fcea5bdc6bf7c14133
                            • Instruction Fuzzy Hash: BA5146B09003499FDB54DFAAD948BAEBBF5FF48304F208459E409B72A0D734A984CB65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 849 6592870-65928ff GetCurrentProcess 853 6592908-659293c GetCurrentThread 849->853 854 6592901-6592907 849->854 855 659293e-6592944 853->855 856 6592945-6592979 GetCurrentProcess 853->856 854->853 855->856 857 659297b-6592981 856->857 858 6592982-659299a 856->858 857->858 871 659299d call 6592e30 858->871 872 659299d call 6592e20 858->872 873 659299d call 6592a55 858->873 862 65929a3-65929d2 GetCurrentThreadId 863 65929db-6592a3d 862->863 864 65929d4-65929da 862->864 864->863 871->862 872->862 873->862
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 065928EE
                            • GetCurrentThread.KERNEL32 ref: 0659292B
                            • GetCurrentProcess.KERNEL32 ref: 06592968
                            • GetCurrentThreadId.KERNEL32 ref: 065929C1
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: c99e4b9a4315e53bcdcae10784df3ef0bcb1c7103195502b4333bb617ecbbcd5
                            • Instruction ID: 23ee1e947891bae217df43bb9e55e43df8e068087387362d940a115226e9d316
                            • Opcode Fuzzy Hash: c99e4b9a4315e53bcdcae10784df3ef0bcb1c7103195502b4333bb617ecbbcd5
                            • Instruction Fuzzy Hash: 3A5146B09002499FDB54DFA9D948BAEBBF5FF48314F208459E409B73A0D734A984CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 874 65a9218-65a923d 875 65a923f-65a9242 874->875 876 65a9268-65a926b 875->876 877 65a9244-65a9263 875->877 878 65a9b2b-65a9b2d 876->878 879 65a9271-65a9286 876->879 877->876 881 65a9b2f 878->881 882 65a9b34-65a9b37 878->882 886 65a9288-65a928e 879->886 887 65a929e-65a92b4 879->887 881->882 882->875 884 65a9b3d-65a9b47 882->884 888 65a9292-65a9294 886->888 889 65a9290 886->889 891 65a92bf-65a92c1 887->891 888->887 889->887 892 65a92d9-65a934a 891->892 893 65a92c3-65a92c9 891->893 904 65a934c-65a936f 892->904 905 65a9376-65a9392 892->905 894 65a92cb 893->894 895 65a92cd-65a92cf 893->895 894->892 895->892 904->905 910 65a93be-65a93d9 905->910 911 65a9394-65a93b7 905->911 916 65a93db-65a93fd 910->916 917 65a9404-65a941f 910->917 911->910 916->917 922 65a944a-65a9454 917->922 923 65a9421-65a9443 917->923 924 65a9456-65a945f 922->924 925 65a9464-65a94de 922->925 923->922 924->884 931 65a952b-65a9540 925->931 932 65a94e0-65a94fe 925->932 931->878 936 65a951a-65a9529 932->936 937 65a9500-65a950f 932->937 936->931 936->932 937->936
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq
                            • API String ID: 0-2428501249
                            • Opcode ID: e61240a3e64af92c8b0957258ef57f87160cb6ba098db13fb9d4c686706b4f17
                            • Instruction ID: 05042699e4c43f120a09b3f6f02d05f0a96765a2c3e6b4050eba6748b80cd6d5
                            • Opcode Fuzzy Hash: e61240a3e64af92c8b0957258ef57f87160cb6ba098db13fb9d4c686706b4f17
                            • Instruction Fuzzy Hash: 76917F30B1061A8FDF98DF78D9507AEB3B6BF85200F108569D809EB358EA35ED45CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 940 65acff8-65ad013 941 65ad015-65ad018 940->941 942 65ad01a-65ad05c 941->942 943 65ad061-65ad064 941->943 942->943 944 65ad06e-65ad071 943->944 945 65ad066-65ad06b 943->945 947 65ad0ba-65ad0bd 944->947 948 65ad073-65ad0b5 944->948 945->944 949 65ad0bf-65ad101 947->949 950 65ad106-65ad109 947->950 948->947 949->950 952 65ad10b-65ad11a 950->952 953 65ad152-65ad155 950->953 955 65ad129-65ad135 952->955 956 65ad11c-65ad121 952->956 958 65ad19e-65ad1a1 953->958 959 65ad157-65ad199 953->959 962 65ad13b-65ad14d 955->962 963 65ada15-65ada4e 955->963 956->955 964 65ad1ea-65ad1ed 958->964 965 65ad1a3-65ad1e5 958->965 959->958 962->953 983 65ada50-65ada53 963->983 966 65ad1ef-65ad231 964->966 967 65ad236-65ad239 964->967 965->964 966->967 970 65ad23f-65ad242 967->970 971 65ad4e4-65ad4f0 967->971 978 65ad28b-65ad28e 970->978 979 65ad244-65ad286 970->979 981 65ad4f6-65ad7e3 971->981 982 65ad334-65ad343 971->982 992 65ad2ab-65ad2ae 978->992 993 65ad290-65ad2a6 978->993 979->978 1153 65ada0a-65ada14 981->1153 1154 65ad7e9-65ad7ef 981->1154 987 65ad352-65ad35e 982->987 988 65ad345-65ad34a 982->988 989 65ada76-65ada79 983->989 990 65ada55-65ada71 983->990 987->963 1002 65ad364-65ad376 987->1002 988->987 995 65ada7b call 65adb6d 989->995 996 65ada88-65ada8b 989->996 990->989 997 65ad2bd-65ad2c0 992->997 998 65ad2b0-65ad2b2 992->998 993->992 1015 65ada81-65ada83 995->1015 1006 65adabe-65adac0 996->1006 1007 65ada8d-65adab9 996->1007 1008 65ad2c2-65ad2de 997->1008 1009 65ad2e3-65ad2e6 997->1009 1004 65ad2b8 998->1004 1005 65ad39f-65ad3a8 998->1005 1033 65ad37b-65ad37e 1002->1033 1004->997 1016 65ad3aa-65ad3af 1005->1016 1017 65ad3b7-65ad3c3 1005->1017 1018 65adac2 1006->1018 1019 65adac7-65adaca 1006->1019 1007->1006 1008->1009 1021 65ad2e8-65ad32a 1009->1021 1022 65ad32f-65ad332 1009->1022 1015->996 1016->1017 1030 65ad3c9-65ad3dd 1017->1030 1031 65ad4d4-65ad4d9 1017->1031 1018->1019 1019->983 1032 65adacc-65adadb 1019->1032 1021->1022 1022->982 1022->1033 1043 65ad4e1 1030->1043 1052 65ad3e3-65ad3f5 1030->1052 1031->1043 1053 65adadd-65adb40 call 65a6668 1032->1053 1054 65adb42-65adb57 1032->1054 1035 65ad38d-65ad38f 1033->1035 1036 65ad380-65ad382 1033->1036 1045 65ad391 1035->1045 1046 65ad396-65ad399 1035->1046 1042 65ad388 1036->1042 1036->1043 1042->1035 1043->971 1045->1046 1046->941 1046->1005 1065 65ad419-65ad41b 1052->1065 1066 65ad3f7-65ad3fd 1052->1066 1053->1054 1064 65adb58 1054->1064 1064->1064 1074 65ad425-65ad431 1065->1074 1069 65ad3ff 1066->1069 1070 65ad401-65ad40d 1066->1070 1073 65ad40f-65ad417 1069->1073 1070->1073 1073->1074 1083 65ad43f 1074->1083 1084 65ad433-65ad43d 1074->1084 1085 65ad444-65ad446 1083->1085 1084->1085 1085->1043 1088 65ad44c-65ad468 call 65a6668 1085->1088 1096 65ad46a-65ad46f 1088->1096 1097 65ad477-65ad483 1088->1097 1096->1097 1097->1031 1098 65ad485-65ad4d2 1097->1098 1098->1043 1155 65ad7fe-65ad807 1154->1155 1156 65ad7f1-65ad7f6 1154->1156 1155->963 1157 65ad80d-65ad820 1155->1157 1156->1155 1159 65ad9fa-65ada04 1157->1159 1160 65ad826-65ad82c 1157->1160 1159->1153 1159->1154 1161 65ad83b-65ad844 1160->1161 1162 65ad82e-65ad833 1160->1162 1161->963 1163 65ad84a-65ad86b 1161->1163 1162->1161 1166 65ad87a-65ad883 1163->1166 1167 65ad86d-65ad872 1163->1167 1166->963 1168 65ad889-65ad8a6 1166->1168 1167->1166 1168->1159 1171 65ad8ac-65ad8b2 1168->1171 1171->963 1172 65ad8b8-65ad8d1 1171->1172 1174 65ad9ed-65ad9f4 1172->1174 1175 65ad8d7-65ad8fe 1172->1175 1174->1159 1174->1171 1175->963 1178 65ad904-65ad90e 1175->1178 1178->963 1179 65ad914-65ad92b 1178->1179 1181 65ad93a-65ad955 1179->1181 1182 65ad92d-65ad938 1179->1182 1181->1174 1187 65ad95b-65ad974 call 65a6668 1181->1187 1182->1181 1191 65ad983-65ad98c 1187->1191 1192 65ad976-65ad97b 1187->1192 1191->963 1193 65ad992-65ad9e6 1191->1193 1192->1191 1193->1174
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq
                            • API String ID: 0-3696375380
                            • Opcode ID: 51f3ff288243f00d89b8f5d4c5244415ae0ab7a37b89e1df35e6379572f66849
                            • Instruction ID: 39f85fef4fb380f3632e8459d18e12fa33ab85cc8357d0ca7550c5b6c10bb96d
                            • Opcode Fuzzy Hash: 51f3ff288243f00d89b8f5d4c5244415ae0ab7a37b89e1df35e6379572f66849
                            • Instruction Fuzzy Hash: 4A623130A006068FCB55EF68E690A9DB7B6FF84300F248A69D4059F769DB75ED46CF80

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1201 65a4c40-65a4c64 1202 65a4c66-65a4c69 1201->1202 1203 65a5348-65a534b 1202->1203 1204 65a4c6f-65a4d67 1202->1204 1205 65a536c-65a536e 1203->1205 1206 65a534d-65a5367 1203->1206 1224 65a4dea-65a4df1 1204->1224 1225 65a4d6d-65a4dba call 65a54e9 1204->1225 1208 65a5370 1205->1208 1209 65a5375-65a5378 1205->1209 1206->1205 1208->1209 1209->1202 1211 65a537e-65a538b 1209->1211 1226 65a4df7-65a4e67 1224->1226 1227 65a4e75-65a4e7e 1224->1227 1238 65a4dc0-65a4ddc 1225->1238 1244 65a4e69 1226->1244 1245 65a4e72 1226->1245 1227->1211 1241 65a4dde 1238->1241 1242 65a4de7 1238->1242 1241->1242 1242->1224 1244->1245 1245->1227
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: foq$XPoq$\Ooq
                            • API String ID: 0-3137531485
                            • Opcode ID: 2af388a33f610714c49095f1ca39e1cb92a08316dec830b9c91239ce9ed1bfc8
                            • Instruction ID: e1d0f61f76fff7a87f6fe42769049551e8e38a32263293a4794e09a15bfff865
                            • Opcode Fuzzy Hash: 2af388a33f610714c49095f1ca39e1cb92a08316dec830b9c91239ce9ed1bfc8
                            • Instruction Fuzzy Hash: 21617170F002099FEB549FA5C855BAEBBF6FF88300F20842AD10AAB395DA758D45DB51

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1863 65a9208-65a923d 1865 65a923f-65a9242 1863->1865 1866 65a9268-65a926b 1865->1866 1867 65a9244-65a9263 1865->1867 1868 65a9b2b-65a9b2d 1866->1868 1869 65a9271-65a9286 1866->1869 1867->1866 1871 65a9b2f 1868->1871 1872 65a9b34-65a9b37 1868->1872 1876 65a9288-65a928e 1869->1876 1877 65a929e-65a92b4 1869->1877 1871->1872 1872->1865 1874 65a9b3d-65a9b47 1872->1874 1878 65a9292-65a9294 1876->1878 1879 65a9290 1876->1879 1881 65a92bf-65a92c1 1877->1881 1878->1877 1879->1877 1882 65a92d9-65a934a 1881->1882 1883 65a92c3-65a92c9 1881->1883 1894 65a934c-65a936f 1882->1894 1895 65a9376-65a9392 1882->1895 1884 65a92cb 1883->1884 1885 65a92cd-65a92cf 1883->1885 1884->1882 1885->1882 1894->1895 1900 65a93be-65a93d9 1895->1900 1901 65a9394-65a93b7 1895->1901 1906 65a93db-65a93fd 1900->1906 1907 65a9404-65a941f 1900->1907 1901->1900 1906->1907 1912 65a944a-65a9454 1907->1912 1913 65a9421-65a9443 1907->1913 1914 65a9456-65a945f 1912->1914 1915 65a9464-65a94de 1912->1915 1913->1912 1914->1874 1921 65a952b-65a9540 1915->1921 1922 65a94e0-65a94fe 1915->1922 1921->1868 1926 65a951a-65a9529 1922->1926 1927 65a9500-65a950f 1922->1927 1926->1921 1926->1922 1927->1926
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq
                            • API String ID: 0-3720491408
                            • Opcode ID: 0ef40a57ea122c6d9782b8c703af0f8f4219df5bfd5e6b9cf5b718f6409be799
                            • Instruction ID: 8d58985fdb1468919cb7f7514caf68ae7e2cc3d166810217dd70e210172f7b94
                            • Opcode Fuzzy Hash: 0ef40a57ea122c6d9782b8c703af0f8f4219df5bfd5e6b9cf5b718f6409be799
                            • Instruction Fuzzy Hash: 6D514D30B142169FDF98DB78D950AAE77BAFBC5200F14856AD809DB358EA35AC418B90
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0659B156
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: f0dbc5eb0c13898a21387aecf9486bab1520f92dee23a62b0c53fe2438910a8e
                            • Instruction ID: d990e826d6ba90bea6592760f2e9c79100743d15d258415b655315d9adc8d0d5
                            • Opcode Fuzzy Hash: f0dbc5eb0c13898a21387aecf9486bab1520f92dee23a62b0c53fe2438910a8e
                            • Instruction Fuzzy Hash: 688144B0A00B058FEB64DF6AD54475ABBF5FF88204F108A2ED49AD7A50D775E805CFA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.4459434333.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_2690000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c944680d9ae4eb99d5847727aa451abdf04878b64484bc1a8826a4a5cd2f8d40
                            • Instruction ID: c7d37c8c4bb62c751843656c00ab0723d5a9202c3db9c6bebc2ead42435f68e9
                            • Opcode Fuzzy Hash: c944680d9ae4eb99d5847727aa451abdf04878b64484bc1a8826a4a5cd2f8d40
                            • Instruction Fuzzy Hash: F8413171D043999FCB15DF69D8046AEBBF9AF89310F04856BD908A7341EB78A840CBE1
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0659D1E2
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: 697d509977faac51b6945d79ed1fbba3b4f28bd5e50865330c0d53e2d1690f4e
                            • Instruction ID: c11a0611e85dd412db0ad661cd343711ccf5dec80ebb361c8d4a88ae3804effb
                            • Opcode Fuzzy Hash: 697d509977faac51b6945d79ed1fbba3b4f28bd5e50865330c0d53e2d1690f4e
                            • Instruction Fuzzy Hash: 9151B1B1D003499FDF14CF99D984ADEBBF5BF49310F24862AE818AB210D7749985CF90
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0659D1E2
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: 6b8f415853aeff34619735d9b5fb7233228810613207e8159f0c65aaeaab43cf
                            • Instruction ID: 3c0e4b5ce04eb65868a8f1f5cad048915aadaa4b2993f1cb96b9efba4829da7c
                            • Opcode Fuzzy Hash: 6b8f415853aeff34619735d9b5fb7233228810613207e8159f0c65aaeaab43cf
                            • Instruction Fuzzy Hash: B141B2B1D003499FDF14CF99C984ADEBBB5FF49310F24862AE818AB210D7759885CF90
                            APIs
                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 0659F8E1
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: CallProcWindow
                            • String ID:
                            • API String ID: 2714655100-0
                            • Opcode ID: 64306c8153560d9c9e4657f4446edfe05f275c0b9373311a320b8a617f2040fe
                            • Instruction ID: ef0b35167ed54546ed2c0121f6cbd5401b59601f178551fa6ffd92590e1de9c2
                            • Opcode Fuzzy Hash: 64306c8153560d9c9e4657f4446edfe05f275c0b9373311a320b8a617f2040fe
                            • Instruction Fuzzy Hash: FC410BB5900309DFDB54DF99C888AAABBF5FF88314F24C859D519AB321D774A841CFA0
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06592B3F
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 2e1d76a01ec7d9d395f51f5f96ec224e1cb8ee7958999fa1a1630778dfb12355
                            • Instruction ID: 87350469f43808c808d028daa4ff12bf442ecb7b3d06a4f36c9ab428a26a9351
                            • Opcode Fuzzy Hash: 2e1d76a01ec7d9d395f51f5f96ec224e1cb8ee7958999fa1a1630778dfb12355
                            • Instruction Fuzzy Hash: 1F21E4B5D00248AFDB10CFAAD584AEEBBF5FB48310F14841AE918A7350D378A940CFA0
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06592B3F
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: e2563b318568f7b39a1881de5d68704f20e55a1fa6c7181f195fd39947a2c702
                            • Instruction ID: 6b46ef3e3e21dceb0e55ae19a7e2effa694ab6a62ad002cb0638e26eddd48742
                            • Opcode Fuzzy Hash: e2563b318568f7b39a1881de5d68704f20e55a1fa6c7181f195fd39947a2c702
                            • Instruction Fuzzy Hash: AA21C4B5D00248AFDB10CF9AD984ADEFBF9FB48310F14841AE918A7350D378A944CFA5
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0659B1D1,00000800,00000000,00000000), ref: 0659B3C2
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 972a6ba3d353a06a99586d311e5ccfc2785ead01edd6abe523ca3a00d854b218
                            • Instruction ID: d2fd370073c6c42cc5ba7f811dab65db3474decacde4281f242af03be6f5f140
                            • Opcode Fuzzy Hash: 972a6ba3d353a06a99586d311e5ccfc2785ead01edd6abe523ca3a00d854b218
                            • Instruction Fuzzy Hash: E611E4B6D003499FEB10DFAAD444A9EFBF4FB88310F14842ED519A7600C379A545CFA5
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0659B1D1,00000800,00000000,00000000), ref: 0659B3C2
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: e78242b23bb41d09104c3bfaf2b956b8953414f9c9a74261c2de4e003d199c39
                            • Instruction ID: adc4dc7e8e63e0a8fdd790f84f2f8f3bd11cc9719e0ed9c1c1ded20ec4f52737
                            • Opcode Fuzzy Hash: e78242b23bb41d09104c3bfaf2b956b8953414f9c9a74261c2de4e003d199c39
                            • Instruction Fuzzy Hash: 611112B6C003099FDB20DFAAD844A9EFBF8FB88310F10842ED519A7200C379A545CFA4
                            APIs
                            • GlobalMemoryStatusEx.KERNELBASE ref: 0269EC0F
                            Memory Dump Source
                            • Source File: 00000003.00000002.4459434333.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_2690000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: GlobalMemoryStatus
                            • String ID:
                            • API String ID: 1890195054-0
                            • Opcode ID: 05f1563632c33df9bb735aec26411846bc69be7cb08ebbfcd29cc3648b363c96
                            • Instruction ID: 03a356b112907172cb711b2400610a16fce3921f9f577ae884a230fe4c27aa20
                            • Opcode Fuzzy Hash: 05f1563632c33df9bb735aec26411846bc69be7cb08ebbfcd29cc3648b363c96
                            • Instruction Fuzzy Hash: 4E11EFB1C006599FCB10DF9AC544AAEFBF8FF48320F14856AD818A7240D778A944CFA5
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0659B156
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464222370.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_6590000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: f4f6b8ce3e795fe63764312c02746f0314a23fb8b84ddc19b5eadf836a2359d7
                            • Instruction ID: f70a874cdfa5e7996c47e44f450e9318b9d6d9f2a095d8c7caa2b3723cad36f3
                            • Opcode Fuzzy Hash: f4f6b8ce3e795fe63764312c02746f0314a23fb8b84ddc19b5eadf836a2359d7
                            • Instruction Fuzzy Hash: 0A11DFB5C002498FDB10DF9AD844A9EFBF4FB89210F14842AD429A7210D379A545CFA5
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: XPoq
                            • API String ID: 0-2250694691
                            • Opcode ID: 61da4a651ff84e50eeb4dd39ee6be14d14b58cc5fbe6c83e4583cdbbbc04588f
                            • Instruction ID: 7f7f71deffcc8ed86222aa92da31e3145cf2a2fb1c649484729c5cab48803d2a
                            • Opcode Fuzzy Hash: 61da4a651ff84e50eeb4dd39ee6be14d14b58cc5fbe6c83e4583cdbbbc04588f
                            • Instruction Fuzzy Hash: FD414E70B002089FDB55DFA5C815BAEBAF6FF88700F20C52AE506AB395DA758C05DB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: PHjq
                            • API String ID: 0-751881793
                            • Opcode ID: 351e906f14526770965a6f539b4e9bd590d923c8b0600d4d551a18668bdbb00b
                            • Instruction ID: 7bdbba8a1462cdc993e48b9ee794f7acc38945f133facab8d3320bb0c9f92738
                            • Opcode Fuzzy Hash: 351e906f14526770965a6f539b4e9bd590d923c8b0600d4d551a18668bdbb00b
                            • Instruction Fuzzy Hash: FE418070E003099FDF54EF65D99469EBBB6BF85300F248629E405EB650EBB4D846CF90
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: PHjq
                            • API String ID: 0-751881793
                            • Opcode ID: 92068cbdec9ed0b01894e43fb31685c7300012aaa9502757a7684c2233619cb6
                            • Instruction ID: a0136497c985cf0388327db8c7d5070666976a1b562a95393429021d21b71a94
                            • Opcode Fuzzy Hash: 92068cbdec9ed0b01894e43fb31685c7300012aaa9502757a7684c2233619cb6
                            • Instruction Fuzzy Hash: 1931BE30B002058FCB59AB34D95576F7BA6BF8A300F288469D406DB395DF75DE4ACB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3c2b31638f30a6e4a25bcee162422ce769e76d8fce08e2b76585e6ae0ad99d7d
                            • Instruction ID: 099643551677931f9003e2406e13e09c0093403085d0085ade624439fe20143f
                            • Opcode Fuzzy Hash: 3c2b31638f30a6e4a25bcee162422ce769e76d8fce08e2b76585e6ae0ad99d7d
                            • Instruction Fuzzy Hash: 79029C34B002048FDB54DB68D954AAEB7F6FF88314F188869E41AAB395DB35ED45CF80
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e3fda67319dbddb2ba87c867b7b0963f3b0bbff0377311ba3dd1b0fb8005228b
                            • Instruction ID: 54fd86f45047666d74a4eccccec48e98325f81acc73d73058fc885de077be4df
                            • Opcode Fuzzy Hash: e3fda67319dbddb2ba87c867b7b0963f3b0bbff0377311ba3dd1b0fb8005228b
                            • Instruction Fuzzy Hash: CE619371F002114BDF549A6DC88466EBADBEFC4610B594439E80ADB378DE75DD0287D1
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7decb1b204139171ea05433ca97c3232cc2b26f509e84ec09c9a5013614b2ec9
                            • Instruction ID: 494f78f538de0ab443f8de2a81f6ee35b885fc5ebd0272d90a674f2c43cf2d87
                            • Opcode Fuzzy Hash: 7decb1b204139171ea05433ca97c3232cc2b26f509e84ec09c9a5013614b2ec9
                            • Instruction Fuzzy Hash: 87915E30E102198FDF60DFA8C950B9DB7B1FF89310F208699D549AB295DB70AA85CF91
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bd3ae95d01ea745183911ad364127a919dc1a6b961645c216b1cd5d016e0be3b
                            • Instruction ID: 353e4230b18972cb80dc4a2fbc8090052e454082d7c10e5259a25bf05ac67606
                            • Opcode Fuzzy Hash: bd3ae95d01ea745183911ad364127a919dc1a6b961645c216b1cd5d016e0be3b
                            • Instruction Fuzzy Hash: DA811C30B006098FDF54DFA8D5546AEB7F6BF89300F248569D40AEB398EB74EC468B51
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 528f16888c558aaa732e063d2b0909d35e983ca867e4c3fc3ec48563ea61cc2f
                            • Instruction ID: 67c3bf7be1b0fda1c3dde129952b0107bef1f1396f8e7a0c93dab5129ca498ad
                            • Opcode Fuzzy Hash: 528f16888c558aaa732e063d2b0909d35e983ca867e4c3fc3ec48563ea61cc2f
                            • Instruction Fuzzy Hash: 5B914D30E102198FDF60DFA8C990B9DB7B1FF89300F208599D549AB355DB70AA85CF91
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f451cd43d08783369e67cc6ef5899b886e7b45ab9f823f309c9a6b7ca071473e
                            • Instruction ID: 10d3a2fc7bd4404576d5e161780a46ead6a0595aed364ef1a3aa849d1c807355
                            • Opcode Fuzzy Hash: f451cd43d08783369e67cc6ef5899b886e7b45ab9f823f309c9a6b7ca071473e
                            • Instruction Fuzzy Hash: 24712B30A002099FDB54DFA9D991A9EBBF6FF84300F248429E419EB365DB30ED46DB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0c2415b56c510affb19054b9041c90193667e3cca44c957592be3f27087174a8
                            • Instruction ID: 1048868a2571aa0e4d6c236dc28048884b3dcd997e4eddd88a60f5bb7a3fbfba
                            • Opcode Fuzzy Hash: 0c2415b56c510affb19054b9041c90193667e3cca44c957592be3f27087174a8
                            • Instruction Fuzzy Hash: B051E131F01206DFDFA4AB78E8546AEBBB2FF85315F208869E506D7250DB319845CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e21e75c4c24c0ca72fa41155d63d55838672ad8c97cca470e436ade2873151a9
                            • Instruction ID: 418c9cf67e62c4e3f589bc793839cf0284dbccb6c8d90359eebd9e5cc0acb105
                            • Opcode Fuzzy Hash: e21e75c4c24c0ca72fa41155d63d55838672ad8c97cca470e436ade2873151a9
                            • Instruction Fuzzy Hash: C551F870B503188FEF64666CD954B6F275FE789310F10492AE40AC73E9DA7CCC058BA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8e3987a771092a539b8e379d47d003302003c42df9c80a6d350cfbb6fea4b7cc
                            • Instruction ID: c0d2654697b87d0f3345ec12032b77f5d1764e9c8b2072f82327cf0d35db27bf
                            • Opcode Fuzzy Hash: 8e3987a771092a539b8e379d47d003302003c42df9c80a6d350cfbb6fea4b7cc
                            • Instruction Fuzzy Hash: 9951E770B503088FEF64666CD95472F365FEB89310F204929E50AC73E9DA7CCC458BA2
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 75c1bf87945466e809bad5d0a44b43de62d2714c72cc79379a4b6a9733a03032
                            • Instruction ID: 2613ce5b1d3aa83710887aa742a76f90cd45ddf264e28c9ed15e6803e8a0733f
                            • Opcode Fuzzy Hash: 75c1bf87945466e809bad5d0a44b43de62d2714c72cc79379a4b6a9733a03032
                            • Instruction Fuzzy Hash: C8414071E007099FDF60CFA9D880AAFF7B6FB99310F10492AD216D7650E631E8458F91
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8eac6dbf6ee264d462f5e8c2ce1868c9b07064560ff4b8e400ccc9795dcec13d
                            • Instruction ID: 0976189f253f8fffac558f5069f2e4919773d3ae1479e966f21e024e5d64fa21
                            • Opcode Fuzzy Hash: 8eac6dbf6ee264d462f5e8c2ce1868c9b07064560ff4b8e400ccc9795dcec13d
                            • Instruction Fuzzy Hash: 7B317430E1070A9FDB14DF64D980ADEBBBAFF85304F108A29E405AB754DB71E946CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b0b1d41c5d9e66327e404a7fbeb63db9196fd1c01330624488abc1c6bddf1a8f
                            • Instruction ID: 251cc83455782ee0dffbf33a1d4fedcd06c220876fec04d0679b40b8ec06eab9
                            • Opcode Fuzzy Hash: b0b1d41c5d9e66327e404a7fbeb63db9196fd1c01330624488abc1c6bddf1a8f
                            • Instruction Fuzzy Hash: F5317C31E1031A8BEF64DFA9D9406EEBBB5FF85314F10892AD819EB200D771A945CBC0
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6a5a1e7f49eda2e81bc261d96752994637895e0b20fc4ef60fc53a51d5e3b6c2
                            • Instruction ID: f182f70527614acab1623c94b6a764cf32ddaae9bb96d0d51e544d494046a589
                            • Opcode Fuzzy Hash: 6a5a1e7f49eda2e81bc261d96752994637895e0b20fc4ef60fc53a51d5e3b6c2
                            • Instruction Fuzzy Hash: E6318D30E102099FDB19CF64D995AAEB7B6BF89300F10C529E916EB354DB71ED82CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 569391fab73bea7492b39163adb2decc73d893317a16377d30b5cdd519132ba4
                            • Instruction ID: fa23099a7c6af001d356e1699d0d7645fd9a2d589e5f147169f6238565b0def2
                            • Opcode Fuzzy Hash: 569391fab73bea7492b39163adb2decc73d893317a16377d30b5cdd519132ba4
                            • Instruction Fuzzy Hash: 59318D30E102099BDB19CF64D995AAEB7B6BF89300F10C529E916EB354DB71ED82CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b7294cef9fca0cb0d1dd61b5f98070a335f955b6dd0a549667544366ad8a21ff
                            • Instruction ID: 38d85c84ee185a8663ccdbbc0399482d1e937a1798c260c3dd7e7a1ade692ebd
                            • Opcode Fuzzy Hash: b7294cef9fca0cb0d1dd61b5f98070a335f955b6dd0a549667544366ad8a21ff
                            • Instruction Fuzzy Hash: 01319C30E102099BCB19CFA4D995AAEB7F2BF89300F10C529E916EB354DB71ED42CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 56994706a20727a4893ae89aa1340ceb04324dd8e0543c05a1843a79c20c6c00
                            • Instruction ID: 0262cc43a1c7a6ddf613d2228e8b58332bce9b1f2c68d60c4276241717bca6b0
                            • Opcode Fuzzy Hash: 56994706a20727a4893ae89aa1340ceb04324dd8e0543c05a1843a79c20c6c00
                            • Instruction Fuzzy Hash: 7E21A175E003018FDF708AA9D880B7EBBB2FB85360F20893AD55AD7281E635D841CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 72192239c6ad039ec5b97addb07a2c5034b01d425b264639917ea21a846ec2fe
                            • Instruction ID: d45b4ba6a0ae3d61759e1dcca6842347fa482cecc202b80f5d8b55a79e368917
                            • Opcode Fuzzy Hash: 72192239c6ad039ec5b97addb07a2c5034b01d425b264639917ea21a846ec2fe
                            • Instruction Fuzzy Hash: 4221AD74F016199FDB10CFB8E840AEEBBF5BB48310F148066E905E7354EB35D8818BA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 04a955a33759bc79b486b09fd01b43cd5f9b2f42a38bc465d44817cdb773df45
                            • Instruction ID: ecd04527ec5f0e491c4c12c69145d7536d8913dcf1651cd2598f518f8ed58d70
                            • Opcode Fuzzy Hash: 04a955a33759bc79b486b09fd01b43cd5f9b2f42a38bc465d44817cdb773df45
                            • Instruction Fuzzy Hash: 1C21A975F007199FDB44DFA9D980AAEBBF5FB48300F14816AE906E7354E735D8408B94
                            Memory Dump Source
                            • Source File: 00000003.00000002.4459199546.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_c8d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2944d21cef8d4622a1e671b02fc324c6784e8b107efd4fbd3dd832ca05132807
                            • Instruction ID: 65979768419a62523d6fa18c6ef6dca97af0779bd51289f4a61c91247a92e048
                            • Opcode Fuzzy Hash: 2944d21cef8d4622a1e671b02fc324c6784e8b107efd4fbd3dd832ca05132807
                            • Instruction Fuzzy Hash: E921F271504204EFCB14EF14D980F26BBA5FB84318F24C669D90A4B296C33AD846CB66
                            Memory Dump Source
                            • Source File: 00000003.00000002.4459199546.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_c8d000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 66214d95e2444df49f34dceb4e165d6a9ef2b5cb8c3d73e00d9ab488f05c4bf5
                            • Instruction ID: f29b5e390a043297f183aa8954914daa07cb14f513a42b201f1db452b4014db1
                            • Opcode Fuzzy Hash: 66214d95e2444df49f34dceb4e165d6a9ef2b5cb8c3d73e00d9ab488f05c4bf5
                            • Instruction Fuzzy Hash: DD214B7110D3C09FCB039B24D994711BF71AB46214F29C5EBD8898F2A7C33A980ADB62
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7976cca675fccfd7ab61af46dff9048993426bde90062ead56da4879cb946f10
                            • Instruction ID: 9cc987416dd0e0663239b53cf8b827a69bd4d10b3ead74af14a80a713065b2ec
                            • Opcode Fuzzy Hash: 7976cca675fccfd7ab61af46dff9048993426bde90062ead56da4879cb946f10
                            • Instruction Fuzzy Hash: 2311E131B045258FCF949B68D9146AE73EBEBC8600F018479D506EB344EE34DC028BD0
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ad9ae38f4845102a3e5ae2d0f80db38c18b285e8836361dc2194cce2b765016d
                            • Instruction ID: c31c139779f31dce9eb636905781bcf043aebb2c679daca8211f5531bd761f2a
                            • Opcode Fuzzy Hash: ad9ae38f4845102a3e5ae2d0f80db38c18b285e8836361dc2194cce2b765016d
                            • Instruction Fuzzy Hash: 8A01F531B002515BDB66DB7CE891B2EB7DADBCA610F14C869E40ACB345DA24DC058792
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ae5d1f11eb115b8e7e7c610b520acd6958383685ce588938b415e3edfdc2faf0
                            • Instruction ID: c2b19b8cfd6a538a7eaed3679e5e722b672330999ec2517dffad786f576719a1
                            • Opcode Fuzzy Hash: ae5d1f11eb115b8e7e7c610b520acd6958383685ce588938b415e3edfdc2faf0
                            • Instruction Fuzzy Hash: A4015230B007101FDB65EA78D854A6F77EAEBC6610F10C4AAF50ACB356DE15DC01C791
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b1b4a29f1bf48feee09e80f393009a78942be07c81a40a362313bba62f917996
                            • Instruction ID: e87489a891894e3b98b14689ebdfe62f0ad11555f7a5c5f7e91778a0dcfc5bc6
                            • Opcode Fuzzy Hash: b1b4a29f1bf48feee09e80f393009a78942be07c81a40a362313bba62f917996
                            • Instruction Fuzzy Hash: 1B2108B5D01219AFCB10DF9AD984ADEFFB8FB48310F10862AE518A7200C374A544CFE5
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 11160d1f4cfbb974d8d592fae455aa83fc67536bb9aae580bf6a4bff5a0137bb
                            • Instruction ID: 76f86de747bf711c0f93fa81a43294acb35b0b31daeceb8216c385d95e5bb1c8
                            • Opcode Fuzzy Hash: 11160d1f4cfbb974d8d592fae455aa83fc67536bb9aae580bf6a4bff5a0137bb
                            • Instruction Fuzzy Hash: 5A014731B141259BDF949668DC246EF37AFEBC5600F01403AE50AE7244FE648C028BE1
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 915d159a12b6ec77a0169351db7cfb113c5bcf5738a2287312b23f5d985ffffe
                            • Instruction ID: 997b83b4d08baed511f36c049261e26d0d2303a381e690cb5728a59783ffad6f
                            • Opcode Fuzzy Hash: 915d159a12b6ec77a0169351db7cfb113c5bcf5738a2287312b23f5d985ffffe
                            • Instruction Fuzzy Hash: DA11D3B1D01219AFCB00DF9AD984ADEFFB4FB49310F10812AE518A7200C374A544CFA5
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3471a7d588fa59b996e81828a11dd85b3515eab32db905b3b8dea59097d96956
                            • Instruction ID: 1b9ef74f1fb6860f5226dbf6adcdb7d2ddfcd0a4cba895770c84df91eb6085ae
                            • Opcode Fuzzy Hash: 3471a7d588fa59b996e81828a11dd85b3515eab32db905b3b8dea59097d96956
                            • Instruction Fuzzy Hash: 1E018131B001101BDB64D6BDD85076FA3DAEBC9721F10C43AE10EC7355EEA5EC424795
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ab6d51a3e7e5cfcc995c1e5672669e2cec1e9708f30bd6a4d4b7cdc3c2d15194
                            • Instruction ID: c8393b950ed8e5fe38b0e2fde7442be4610364e205d3609a6671169769fafb03
                            • Opcode Fuzzy Hash: ab6d51a3e7e5cfcc995c1e5672669e2cec1e9708f30bd6a4d4b7cdc3c2d15194
                            • Instruction Fuzzy Hash: C601AF31B101111BDBA5967DE851B2FA3DAEBC9A20F10C839E50ECB384DE25DC025791
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 78ce01470c5577816a2df42cd9fb456a30cb02c1d64cbaa55baa3b6ac41dafda
                            • Instruction ID: ab48a680be829dd7c0c081c92f3d95dbd541596a6544732f330be2a6314b6aa0
                            • Opcode Fuzzy Hash: 78ce01470c5577816a2df42cd9fb456a30cb02c1d64cbaa55baa3b6ac41dafda
                            • Instruction Fuzzy Hash: B3013130B006155BDB65EA7CE85471F73EAEB89620F108479F60ACB354EE26EC01CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3dd4feb603fb13ee7121a2581454ffebd3245a1959d1d9d322028f8017ed5e3
                            • Instruction ID: bdd0cfbcbaea8ff408996f748c3744503bb2a0ce5a2df4c260603b634e4316f0
                            • Opcode Fuzzy Hash: c3dd4feb603fb13ee7121a2581454ffebd3245a1959d1d9d322028f8017ed5e3
                            • Instruction Fuzzy Hash: 22E09AB0E24309ABDF50CA70C90975E7AADE746204F6489B6E808C7142F17ACE018B90
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq
                            • API String ID: 0-3810553869
                            • Opcode ID: aa328c6923a2c2520b99237a274ac6fa90f877d336c9e56c82e406670f0b09b7
                            • Instruction ID: b9df97cc8812419b2bca75556a0ed234065b93bf20f76549daac0d2c01fc502e
                            • Opcode Fuzzy Hash: aa328c6923a2c2520b99237a274ac6fa90f877d336c9e56c82e406670f0b09b7
                            • Instruction Fuzzy Hash: 5E123B34E007198FDB68DF65C954AAEB7B6FF88300F2085A9D40AAB364DB359D45CF90
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq
                            • API String ID: 0-666546452
                            • Opcode ID: ef7fd54107d9dc9b0acbf2f25cbdcee221dc97d3a0ae4424b276c96856faebac
                            • Instruction ID: e944de54807cea17341858b34e14dce87cd1f153cc98915bcc777098979ff189
                            • Opcode Fuzzy Hash: ef7fd54107d9dc9b0acbf2f25cbdcee221dc97d3a0ae4424b276c96856faebac
                            • Instruction Fuzzy Hash: 40C15C30A103068FDB59EF65D9906AEB7B6FF89300F24896DD815AB358DB34DC46CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq
                            • API String ID: 0-666546452
                            • Opcode ID: b57a8441eb7f812e4afc64c520d8b609918a6adf8024f94a44aeb418eb0c0025
                            • Instruction ID: fe99825ca32959c647956d8b4d2fe8671136014dc70eb3b2f910432cddc94b22
                            • Opcode Fuzzy Hash: b57a8441eb7f812e4afc64c520d8b609918a6adf8024f94a44aeb418eb0c0025
                            • Instruction Fuzzy Hash: FE913F30A403099FEB68DF64D954BAEBBF6FF84301F148529E806A7294DB749D45CF90
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq$$jq$$jq
                            • API String ID: 0-3356825164
                            • Opcode ID: 7ef98fff5a3927578feabf316349ce961a0ad2b21cf24de788d9cfa6d987eb9a
                            • Instruction ID: 2c31e622100815e07b524165e469e55d32e066ecc8ce51681259e42e596fac28
                            • Opcode Fuzzy Hash: 7ef98fff5a3927578feabf316349ce961a0ad2b21cf24de788d9cfa6d987eb9a
                            • Instruction Fuzzy Hash: 2EF14E34A01208CFDB59EFA5D550A6EBBB7FF88300F248569D4069B369DB35AC42CF84
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq
                            • API String ID: 0-2428501249
                            • Opcode ID: 7b91a7bcb565a32a1d28b595c9dcb967437e2d588f84e2f230fb91864d62afae
                            • Instruction ID: e86fc69dff477c769ddec421eff8bbc8ac989d0553c089192deb4d3d8d06b821
                            • Opcode Fuzzy Hash: 7b91a7bcb565a32a1d28b595c9dcb967437e2d588f84e2f230fb91864d62afae
                            • Instruction Fuzzy Hash: 57B12D30E112198FDB58EF64D5906AEBBB6FF84310F248869D4069B3A5DF75DC86CB80
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRjq$LRjq$$jq$$jq
                            • API String ID: 0-2974078839
                            • Opcode ID: ee9e1f49ece87c6f7390d50f3759f20725ae0ba941bbed2972cd1d6673ebfa97
                            • Instruction ID: ca3d84c241584f55a6c2c256fd696624841697cbf6d54cb23c089c0071e77e10
                            • Opcode Fuzzy Hash: ee9e1f49ece87c6f7390d50f3759f20725ae0ba941bbed2972cd1d6673ebfa97
                            • Instruction Fuzzy Hash: 50518030B002019FDB58EF78D990A6E77B6FF89310F1489A9E4159B3A9DB35EC44CB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.4464265884.00000000065A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_65a0000_Quotation_#432768#_pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $jq$$jq$$jq$$jq
                            • API String ID: 0-2428501249
                            • Opcode ID: 3460e3d530845a4f3de26249461bcb078e08b3096918a62ee458237926e941ee
                            • Instruction ID: 69f416e5c62c804012b086c90be3a88290bc9a3429c646b8f5725b2e872e4cfc
                            • Opcode Fuzzy Hash: 3460e3d530845a4f3de26249461bcb078e08b3096918a62ee458237926e941ee
                            • Instruction Fuzzy Hash: C9519E34A113059FDF69EB64E580AAEB3B6FB89310F14896ED806AB354DB35DC41CF90