Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rQuotation.exe

Overview

General Information

Sample name:rQuotation.exe
Analysis ID:1465511
MD5:19c0bb3b7e9c41e5d47b78566e04d3de
SHA1:ee19431fbe432dc27074a776c8d3cd1ee3f5f708
SHA256:a60e8f372f54d47394a2091f56649707f1a0fffadb0afc3600f8ec103ff53d6e
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: RegAsm connects to smtp port
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rQuotation.exe (PID: 6476 cmdline: "C:\Users\user\Desktop\rQuotation.exe" MD5: 19C0BB3B7E9C41E5D47B78566E04D3DE)
    • conhost.exe (PID: 6492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 7032 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 7072 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 6188 cmdline: C:\Windows\system32\WerFault.exe -u -p 6476 -s 1120 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "terminal4.veeblehosting.com", "Username": "obimoney@xjyllc.com", "Password": "Ifeanyi1987@"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000003.00000002.2873010607.0000000002EFE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.2873010607.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.2873010607.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000002.2873010607.0000000002F21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            0.2.rQuotation.exe.191205183b0.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.rQuotation.exe.191205183b0.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.rQuotation.exe.191205183b0.3.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3244d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x324bf:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x32549:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x325db:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x32645:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x326b7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3274d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x327dd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.rQuotation.exe.19120553df8.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.rQuotation.exe.19120553df8.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 13 entries

                    Networking

                    barindex
                    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 108.170.55.203, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, Initiated: true, ProcessId: 7032, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "terminal4.veeblehosting.com", "Username": "obimoney@xjyllc.com", "Password": "Ifeanyi1987@"}
                    Source: rQuotation.exeReversingLabs: Detection: 18%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                    Exploits

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rQuotation.exe PID: 6476, type: MEMORYSTR
                    Source: rQuotation.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.pdb/ source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.ni.pdbRSDS source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.pdbp^y source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WERFF7.tmp.dmp.7.dr

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.rQuotation.exe.19120553df8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.4:49736 -> 108.170.55.203:587
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewIP Address: 108.170.55.203 108.170.55.203
                    Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                    Source: Joe Sandbox ViewASN Name: SSASN2US SSASN2US
                    Source: unknownDNS query: name: ip-api.com
                    Source: global trafficTCP traffic: 192.168.2.4:49736 -> 108.170.55.203:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: terminal4.veeblehosting.com
                    Source: RegAsm.exe, 00000003.00000002.2873010607.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: rQuotation.exe, 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: RegAsm.exe, 00000003.00000002.2872288588.000000000130B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0&
                    Source: RegAsm.exe, 00000003.00000002.2872288588.000000000130B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2877653014.0000000006370000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: RegAsm.exe, 00000003.00000002.2873010607.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://terminal4.veeblehosting.com
                    Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: RegAsm.exe, 00000003.00000002.2872288588.000000000130B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2871882555.0000000001240000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2877653014.0000000006377000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegAsm.exe, 00000003.00000002.2872288588.000000000130B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2871882555.0000000001240000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2877653014.0000000006377000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: rQuotation.exe, 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, SKTzxzsJw.cs.Net Code: WnSI7AqB
                    Source: 0.2.rQuotation.exe.19120553df8.1.raw.unpack, SKTzxzsJw.cs.Net Code: WnSI7AqB

                    System Summary

                    barindex
                    Source: 0.2.rQuotation.exe.191205183b0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.rQuotation.exe.19120553df8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.rQuotation.exe.19120553df8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: rQuotation.exe
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B89CB840_2_00007FFD9B89CB84
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B89AB200_2_00007FFD9B89AB20
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B8A03590_2_00007FFD9B8A0359
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B89D3490_2_00007FFD9B89D349
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B895D850_2_00007FFD9B895D85
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B8914ED0_2_00007FFD9B8914ED
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B8905080_2_00007FFD9B890508
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B9700500_2_00007FFD9B970050
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02D84AC03_2_02D84AC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02D83EA83_2_02D83EA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02D8EDE03_2_02D8EDE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02D8AD103_2_02D8AD10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02D841F03_2_02D841F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0679C4803_2_0679C480
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0679AE5C3_2_0679AE5C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_068156803_2_06815680
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_068166983_2_06816698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_068124283_2_06812428
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0681B2D83_2_0681B2D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_06817E203_2_06817E20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_068177403_2_06817740
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0681E4483_2_0681E448
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_068100403_2_06810040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_06815D983_2_06815D98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_068100073_2_06810007
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6476 -s 1120
                    Source: rQuotation.exeStatic PE information: No import functions for PE file found
                    Source: rQuotation.exe, 00000000.00000000.1628351170.000001910E582000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUzufiterexoci2 vs rQuotation.exe
                    Source: rQuotation.exe, 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename5ffba3ae-11a9-4054-a8dd-57e8bc621827.exe@ vs rQuotation.exe
                    Source: rQuotation.exeBinary or memory string: OriginalFilenameUzufiterexoci2 vs rQuotation.exe
                    Source: 0.2.rQuotation.exe.191205183b0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rQuotation.exe.19120553df8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rQuotation.exe.19120553df8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: classification engineClassification label: mal100.spre.troj.spyw.expl.evad.winEXE@7/5@2/2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6492:120:WilError_03
                    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6476
                    Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d4749ba5-1e48-4ebf-8b28-6926bb25339bJump to behavior
                    Source: rQuotation.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: rQuotation.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: rQuotation.exeReversingLabs: Detection: 18%
                    Source: C:\Users\user\Desktop\rQuotation.exeFile read: C:\Users\user\Desktop\rQuotation.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\rQuotation.exe "C:\Users\user\Desktop\rQuotation.exe"
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6476 -s 1120
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\rQuotation.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: rQuotation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: rQuotation.exeStatic file information: File size 1876079 > 1048576
                    Source: rQuotation.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: rQuotation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.pdb/ source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.ni.pdbRSDS source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.pdbp^y source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.ni.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WERFF7.tmp.dmp.7.dr
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B8A5880 push edx; retf 0_2_00007FFD9B8A59DB
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B89C42A pushad ; retf 0_2_00007FFD9B89C449
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B8994A8 pushad ; retf 5F4Eh0_2_00007FFD9B89B4FD
                    Source: C:\Users\user\Desktop\rQuotation.exeCode function: 0_2_00007FFD9B970050 push esp; retf 4810h0_2_00007FFD9B970312
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: rQuotation.exe PID: 6476, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: rQuotation.exe, 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory allocated: 1910E8B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory allocated: 19128270000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2EA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4EA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3865Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5740Thread sleep count: 1203 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5740Thread sleep count: 3865 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -99657s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -99532s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -99420s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -99297s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -99188s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -99078s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98969s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98844s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98735s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98610s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98499s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98375s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98266s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98141s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -98031s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -97922s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -97813s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -97688s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -97572s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -97453s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -97344s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -97232s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5460Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99657Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99532Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99420Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98499Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98266Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98141Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97572Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97232Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Amcache.hve.7.drBinary or memory string: VMware
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: RegAsm.exe, 00000003.00000002.2877653014.0000000006377000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll#
                    Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                    Source: RegAsm.exe, 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                    Source: RegAsm.exe, 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: rQuotation.exe, 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02D870A0 CheckRemoteDebuggerPresent,3_2_02D870A0
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: rQuotation.exe, -------.csReference to suspicious API methods: GetProcAddress(_0EBE_EEF9_EE7E_061C_EE8F_06DE, _EE1B_EE1E_EE20_EEBD_0657_EEBD_EEBE_065C)
                    Source: rQuotation.exe, -------.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)_0607_EEE8_EE71_064C_EE22_EE04_EE00_EE29_EE61_EC87.Length, 64u, out var _0E73_ECBE_EC95_EED2_EEF9)
                    Source: rQuotation.exe, -------.csReference to suspicious API methods: LoadLibrary(_08FB_EEB3_EC9A_EE6E_EE01_EED9_EC8E_EEF1_065E_0606_EE38_EE23_ECB1_EE7E_EC89_EC76_ECB7_0E6A_EECF(_EEA7_EED4_EE72._EEF7_0654_0E66_EEE9_EEF2_06E0_0606_EE98_06D8_EC87_EEEA_08EC))
                    Source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, zOS.csReference to suspicious API methods: _120HqGy.OpenProcess(_2pIt.DuplicateHandle, bInheritHandle: true, (uint)iVE.ProcessID)
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: FB3008Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Users\user\Desktop\rQuotation.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rQuotation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.rQuotation.exe.191205183b0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.19120553df8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.19120553df8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2873010607.0000000002EFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2873010607.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2873010607.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rQuotation.exe PID: 6476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7032, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.rQuotation.exe.191205183b0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.19120553df8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.19120553df8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2873010607.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rQuotation.exe PID: 6476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7032, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.rQuotation.exe.191205183b0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.19120553df8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.19120553df8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rQuotation.exe.191205183b0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2873010607.0000000002EFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2873010607.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2873010607.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rQuotation.exe PID: 6476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7032, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    Boot or Logon Initialization Scripts211
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    34
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    541
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    DLL Side-Loading
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script261
                    Virtualization/Sandbox Evasion
                    LSA Secrets261
                    Virtualization/Sandbox Evasion
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts211
                    Process Injection
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465511 Sample: rQuotation.exe Startdate: 01/07/2024 Architecture: WINDOWS Score: 100 23 terminal4.veeblehosting.com 2->23 25 ip-api.com 2->25 31 Found malware configuration 2->31 33 Malicious sample detected (through community Yara rule) 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 10 other signatures 2->37 7 rQuotation.exe 3 2->7         started        signatures3 process4 signatures5 39 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->39 41 Writes to foreign memory regions 7->41 43 Injects a PE file into a foreign processes 7->43 10 RegAsm.exe 15 2 7->10         started        14 WerFault.exe 19 16 7->14         started        17 conhost.exe 7->17         started        19 RegAsm.exe 7->19         started        process6 dnsIp7 27 ip-api.com 208.95.112.1, 49733, 80 TUT-ASUS United States 10->27 29 terminal4.veeblehosting.com 108.170.55.203, 49736, 587 SSASN2US United States 10->29 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 10->45 47 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 10->47 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->49 51 4 other signatures 10->51 21 C:\ProgramData\Microsoft\...\Report.wer, Unicode 14->21 dropped file8 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    rQuotation.exe18%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                    http://www.fontbureau.com0%URL Reputationsafe
                    http://www.fontbureau.com/designersG0%URL Reputationsafe
                    http://www.fontbureau.com/designers/?0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://www.fontbureau.com/designers?0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://upx.sf.net0%URL Reputationsafe
                    http://www.fontbureau.com/designers0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://ip-api.com0%URL Reputationsafe
                    http://r3.o.lencr.org00%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.fontbureau.com/designers80%URL Reputationsafe
                    http://www.fonts.com0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                    http://terminal4.veeblehosting.com0%Avira URL Cloudsafe
                    http://r3.i.lencr.org/0&0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    ip-api.com
                    208.95.112.1
                    truetrue
                      unknown
                      terminal4.veeblehosting.com
                      108.170.55.203
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://ip-api.com/line/?fields=hostingfalse
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.apache.org/licenses/LICENSE-2.0rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersGrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://terminal4.veeblehosting.comRegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers/?rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/bTherQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://account.dyn.com/rQuotation.exe, 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.comrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://upx.sf.netAmcache.hve.7.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.goodfont.co.krrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTherQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://x1.c.lencr.org/0RegAsm.exe, 00000003.00000002.2872288588.000000000130B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2871882555.0000000001240000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2877653014.0000000006377000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://x1.i.lencr.org/0RegAsm.exe, 00000003.00000002.2872288588.000000000130B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2871882555.0000000001240000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2877653014.0000000006377000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ip-api.comRegAsm.exe, 00000003.00000002.2873010607.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://r3.o.lencr.org0RegAsm.exe, 00000003.00000002.2872288588.000000000130B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2877653014.0000000006370000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaserQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8rQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fonts.comrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sandoll.co.krrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleaserQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000003.00000002.2873010607.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comrQuotation.exe, 00000000.00000002.1794857203.0000019129B62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://r3.i.lencr.org/0&RegAsm.exe, 00000003.00000002.2872288588.000000000130B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2873010607.0000000002F04000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        208.95.112.1
                        ip-api.comUnited States
                        53334TUT-ASUStrue
                        108.170.55.203
                        terminal4.veeblehosting.comUnited States
                        20454SSASN2UStrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1465511
                        Start date and time:2024-07-01 18:42:09 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 29s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:13
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:rQuotation.exe
                        Detection:MAL
                        Classification:mal100.spre.troj.spyw.expl.evad.winEXE@7/5@2/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 87%
                        • Number of executed functions: 80
                        • Number of non-executed functions: 6
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 104.208.16.94
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        • VT rate limit hit for: rQuotation.exe
                        TimeTypeDescription
                        12:43:00API Interceptor25x Sleep call for process: RegAsm.exe modified
                        12:43:11API Interceptor1x Sleep call for process: WerFault.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        208.95.112.18f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • ip-api.com/line/?fields=hosting
                        v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • ip-api.com/line/?fields=hosting
                        108.170.55.203Quotation.exeGet hashmaliciousAgentTeslaBrowse
                          y8116vE0F0.exeGet hashmaliciousAgentTeslaBrowse
                            INQUIRY.exeGet hashmaliciousAgentTeslaBrowse
                              PURCHASE ORDER No. 4500148605.exeGet hashmaliciousAgentTeslaBrowse
                                Your file name without extension goes here.exeGet hashmaliciousAgentTeslaBrowse
                                  RFQ 030-02052024 LB.exeGet hashmaliciousAgentTeslaBrowse
                                    Your file name without extension goes here.exeGet hashmaliciousAgentTeslaBrowse
                                      QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                        SecuriteInfo.com.FileRepMalware.27177.7318.exeGet hashmaliciousAgentTeslaBrowse
                                          FW URGENT RFQ-400098211.exeGet hashmaliciousAgentTeslaBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            terminal4.veeblehosting.comQuotation.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            Your file name without extension goes here.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.202
                                            R9eF05c3nd.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.202
                                            y8116vE0F0.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            INQUIRY.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            PURCHASE ORDER No. 4500148605.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            Your file name without extension goes here.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            RFQ 030-02052024 LB.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            Your file name without extension goes here.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            rQUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.202
                                            ip-api.com8f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 208.95.112.1
                                            v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 208.95.112.1
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            TUT-ASUS8f5WsFcnTc.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 208.95.112.1
                                            v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 208.95.112.1
                                            SSASN2UShttp://beonlineboo.comGet hashmaliciousUnknownBrowse
                                            • 209.188.14.135
                                            Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            Your file name without extension goes here.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.202
                                            ORDER060424.exeGet hashmaliciousAgentTeslaBrowse
                                            • 184.95.55.27
                                            R9eF05c3nd.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.202
                                            y8116vE0F0.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            INQUIRY.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            PURCHASE ORDER No. 4500148605.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            Your file name without extension goes here.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.170.55.203
                                            lgX7lgUL1w.exeGet hashmaliciousNeoreklami, PureLog Stealer, SmokeLoaderBrowse
                                            • 66.85.156.89
                                            No context
                                            No context
                                            Process:C:\Windows\System32\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):1.0864548571164316
                                            Encrypted:false
                                            SSDEEP:192:f1Uu1A4Ta2l50UnU9aWBe3ZFlnG0/zuiF8Z24lO8QZC:CKA4T1YUnU9amwG2zuiF8Y4lO8Qs
                                            MD5:590AC8D3DBE0EA4E3E5DB0FC45EF852F
                                            SHA1:FEBB3587826A4C500D7C23940046CEF4F8AA193B
                                            SHA-256:A6FDD9F32243617D26D69055A8D32608C0733ED63FACBD0BF29F3572C9AA21EB
                                            SHA-512:595E0A4933A59C868DC4AFFA16D1289DBA4F5BD8C595E0B6CEF93FF86F366D775E26B46150D0946AB819F56C74423AC2EF9CD97A1FDC9381387A4CB804B7D2BE
                                            Malicious:true
                                            Reputation:low
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.3.2.5.7.7.8.9.9.1.3.7.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.3.2.5.7.7.9.9.2.8.8.8.2.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.7.1.f.d.f.d.b.-.3.5.f.e.-.4.7.4.f.-.9.5.5.6.-.a.6.7.5.e.d.7.3.1.3.4.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.b.b.b.c.3.a.-.e.a.8.7.-.4.8.a.9.-.8.c.b.d.-.a.7.6.5.8.b.1.3.5.6.7.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.Q.u.o.t.a.t.i.o.n...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.z.u.f.i.t.e.r.e.x.o.c.i.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.4.c.-.0.0.0.1.-.0.0.1.4.-.a.7.5.2.-.e.b.b.8.d.5.c.b.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.1.5.1.2.d.b.d.a.c.4.5.c.b.7.8.d.1.1.a.7.2.b.1.8.3.0.0.7.7.3.5.0.0.0.0.0.0.0.0.!.0.0.0.0.e.e.1.9.4.3.1.f.b.e.4.3.2.d.c.2.7.0.7.4.a.7.7.6.c.8.d.3.c.d.1.e.e.3.f.5.f.7.0.8.!.r.Q.u.o.t.a.t.i.o.
                                            Process:C:\Windows\System32\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):9056
                                            Entropy (8bit):3.712730037816931
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJ6Fh36Y9kvMXQgmfhc6Jqrprw89btF/fYvm:R6lXJgh6YevMXQgmf2iut9f9
                                            MD5:CD2BE64F684FA418B19A30D6C2C42372
                                            SHA1:66DAD324A5106E222DFAC8E4E7539A7C20F3D173
                                            SHA-256:3F2BC4BD785497805573539B1CD4141D2E2540932FBB093645F479D3CD67C4B7
                                            SHA-512:E522D8F23E213402541BCBD4BA4A647C3C2717B87A36E2C0AB9B96D80934A9764B8E984B2C254A56D463977D3338F69E28DD4BF69EB97CC044E1298F40A62B0B
                                            Malicious:false
                                            Reputation:low
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.7.6.<./.P.i.
                                            Process:C:\Windows\System32\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4766
                                            Entropy (8bit):4.509984019776081
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zsoJg771I9FyWpW8VY2Ym8M4JyNAFE+xyq85iewL8Q4d:uIjfuI76T7ViJySxz/L34d
                                            MD5:A7F6DDA948900FF5577137109A2874E0
                                            SHA1:1A349CC6A82DFE67444C26AF757F08B7B0836F9D
                                            SHA-256:0EF568973EFB94CAECCE7E2E97EC7B8D0173CA74A9FEDEB4F972A98837F6C795
                                            SHA-512:F8DBF51E0FBAE2C61A3DAB88623E1CB7BC99D72A8AA82471FACAA4F9682BAB1DDF76C50F7167E4EE8783094F9FD9C57C5874D31EA2A33FECB137F0165FB7CDEF
                                            Malicious:false
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="392145" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Windows\System32\WerFault.exe
                                            File Type:Mini DuMP crash report, 16 streams, Mon Jul 1 16:42:59 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):475578
                                            Entropy (8bit):3.358458680323315
                                            Encrypted:false
                                            SSDEEP:3072:nq7nJwnXAz+yXx4WgcS59GbybN1CCq8FX3+vP8ZpUVT:ngJwyBGabiqI3Q0pU
                                            MD5:49E6B2F32E88FD8313E906A2C965346D
                                            SHA1:1EDBE563281B12AA4167717DF149ACBE2BFA6577
                                            SHA-256:E9846A120F860F04ECEC88F1625093F29A9F5B6F049B3CF3E6812F6F83D74F9C
                                            SHA-512:A364F979B4D1EB98A033BE936B040CCCF0F77B162C232A4591C42D6E6A22BDF5B22ED24F66521270608A49E381D2CC5F2B625FA8F668C2FE5DD5D481FEFC64BC
                                            Malicious:false
                                            Reputation:low
                                            Preview:MDMP..a..... .........f............D...............d.......$...X...........|........U..............l.......8...........T............,..............H=..........4?..............................................................................eJ.......?......Lw......................T.......L.....f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.466036028196891
                                            Encrypted:false
                                            SSDEEP:6144:MIXfpi67eLPU9skLmb0b4FWSPKaJG8nAgejZMMhA2gX4WABl0uNYdwBCswSbt:xXD94FWlLZMM6YFH++t
                                            MD5:D1EF3C4149C81E8A234959367E90EA8F
                                            SHA1:1AD58F832F698D548EFF041B25188A912D116D7F
                                            SHA-256:0D6CDA027FC3F8AF05B5C1951D286CBA5FEB406459ED122D2DC6A51202A41250
                                            SHA-512:5F4F30A488258E00FEB271821357E1C80AF524F2DED57148366A6E7A94475932C01616C4085ABF414F076C2BEF59BAA3DF268A1C740D1BD49066A4E9883548BE
                                            Malicious:false
                                            Reputation:low
                                            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.]..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):5.3677918797110635
                                            TrID:
                                            • Win64 Executable Console Net Framework (206006/5) 48.58%
                                            • Win64 Executable Console (202006/5) 47.64%
                                            • Win64 Executable (generic) (12005/4) 2.83%
                                            • Generic Win/DOS Executable (2004/3) 0.47%
                                            • DOS Executable Generic (2002/1) 0.47%
                                            File name:rQuotation.exe
                                            File size:1'876'079 bytes
                                            MD5:19c0bb3b7e9c41e5d47b78566e04d3de
                                            SHA1:ee19431fbe432dc27074a776c8d3cd1ee3f5f708
                                            SHA256:a60e8f372f54d47394a2091f56649707f1a0fffadb0afc3600f8ec103ff53d6e
                                            SHA512:f93084699839ea5da8ad449490bc73ac0694f5a858b367ba25a1aa82f4900caa6b292d9ff8d1d8768ae3f9705e628446b3497168e4b06a129fc3862fa47b93cc
                                            SSDEEP:12288:iXTOt5ewyLVvhjH838znIkxg0B2jdtH+Ti1TDRckULP6pE+cz:iyefLdhjc38jIQg0B2ZHRnULi0
                                            TLSH:18951121BA67AE53FE9B1676E0D537F405FE8C8371F199AFEF809C99088227C051507A
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f.........."...0.................. ....@...... ....................................`................................
                                            Icon Hash:90cececece8e8eb0
                                            Entrypoint:0x400000
                                            Entrypoint Section:
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows cui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x6682ACAB [Mon Jul 1 13:18:35 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:
                                            Instruction
                                            dec ebp
                                            pop edx
                                            nop
                                            add byte ptr [ebx], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax+eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000xa94.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb4e60x1c.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x95820x960095fd203eadc825097529d8207a753e3cFalse0.5885416666666666data6.453857954300438IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xc0000xa940xc00445b34a52ef3a8a8370ae3be463d6532False0.275390625data4.387705158987614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_VERSION0xc0b80x3f8data0.484251968503937
                                            RT_VERSION0xc4b00x3f8dataEnglishUnited States0.484251968503937
                                            RT_MANIFEST0xc8a80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 1, 2024 18:42:59.938405991 CEST4973380192.168.2.4208.95.112.1
                                            Jul 1, 2024 18:42:59.943552017 CEST8049733208.95.112.1192.168.2.4
                                            Jul 1, 2024 18:42:59.943659067 CEST4973380192.168.2.4208.95.112.1
                                            Jul 1, 2024 18:42:59.944499969 CEST4973380192.168.2.4208.95.112.1
                                            Jul 1, 2024 18:42:59.949774981 CEST8049733208.95.112.1192.168.2.4
                                            Jul 1, 2024 18:43:00.412911892 CEST8049733208.95.112.1192.168.2.4
                                            Jul 1, 2024 18:43:00.465950012 CEST4973380192.168.2.4208.95.112.1
                                            Jul 1, 2024 18:43:01.272777081 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:01.278364897 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:01.278460026 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:01.831456900 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:01.831615925 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:01.836751938 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:01.986022949 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:01.991200924 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:01.997502089 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.145862103 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.152112961 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:02.156975031 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.317781925 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.317878962 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.317889929 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.317930937 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:02.318805933 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.318882942 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:02.355576038 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:02.360408068 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.509190083 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.524990082 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:02.529696941 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.678913116 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.700902939 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:02.705904961 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.855238914 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:02.856137037 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:02.860960007 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.167504072 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.167727947 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:03.172538996 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.319950104 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.320111036 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:03.324934006 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.603168964 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.603347063 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:03.610462904 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.767673016 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.768328905 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:03.768408060 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:03.768429041 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:03.768451929 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:03.773746967 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.773821115 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.773905039 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:03.773915052 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:04.081171989 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:43:04.122184992 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:43:51.263151884 CEST4973380192.168.2.4208.95.112.1
                                            Jul 1, 2024 18:43:51.271199942 CEST8049733208.95.112.1192.168.2.4
                                            Jul 1, 2024 18:43:51.271290064 CEST4973380192.168.2.4208.95.112.1
                                            Jul 1, 2024 18:44:41.278992891 CEST49736587192.168.2.4108.170.55.203
                                            Jul 1, 2024 18:44:41.444897890 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:44:41.595026016 CEST58749736108.170.55.203192.168.2.4
                                            Jul 1, 2024 18:44:41.598539114 CEST49736587192.168.2.4108.170.55.203
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 1, 2024 18:42:59.896805048 CEST5667753192.168.2.41.1.1.1
                                            Jul 1, 2024 18:42:59.904280901 CEST53566771.1.1.1192.168.2.4
                                            Jul 1, 2024 18:43:01.259967089 CEST5589553192.168.2.41.1.1.1
                                            Jul 1, 2024 18:43:01.272191048 CEST53558951.1.1.1192.168.2.4
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jul 1, 2024 18:42:59.896805048 CEST192.168.2.41.1.1.10x852Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                            Jul 1, 2024 18:43:01.259967089 CEST192.168.2.41.1.1.10x55a0Standard query (0)terminal4.veeblehosting.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jul 1, 2024 18:42:59.904280901 CEST1.1.1.1192.168.2.40x852No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                            Jul 1, 2024 18:43:01.272191048 CEST1.1.1.1192.168.2.40x55a0No error (0)terminal4.veeblehosting.com108.170.55.203A (IP address)IN (0x0001)false
                                            Jul 1, 2024 18:43:01.272191048 CEST1.1.1.1192.168.2.40x55a0No error (0)terminal4.veeblehosting.com108.170.55.202A (IP address)IN (0x0001)false
                                            • ip-api.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.449733208.95.112.1807032C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 1, 2024 18:42:59.944499969 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                            Host: ip-api.com
                                            Connection: Keep-Alive
                                            Jul 1, 2024 18:43:00.412911892 CEST175INHTTP/1.1 200 OK
                                            Date: Mon, 01 Jul 2024 16:43:00 GMT
                                            Content-Type: text/plain; charset=utf-8
                                            Content-Length: 6
                                            Access-Control-Allow-Origin: *
                                            X-Ttl: 60
                                            X-Rl: 44
                                            Data Raw: 66 61 6c 73 65 0a
                                            Data Ascii: false


                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Jul 1, 2024 18:43:01.831456900 CEST58749736108.170.55.203192.168.2.4220-terminal4.veeblehosting.com ESMTP Exim 4.97.1 #2 Mon, 01 Jul 2024 09:43:01 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 1, 2024 18:43:01.831615925 CEST49736587192.168.2.4108.170.55.203EHLO 965543
                                            Jul 1, 2024 18:43:01.986022949 CEST58749736108.170.55.203192.168.2.4250-terminal4.veeblehosting.com Hello 965543 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-STARTTLS
                                            250 HELP
                                            Jul 1, 2024 18:43:01.991200924 CEST49736587192.168.2.4108.170.55.203STARTTLS
                                            Jul 1, 2024 18:43:02.145862103 CEST58749736108.170.55.203192.168.2.4220 TLS go ahead

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:12:42:55
                                            Start date:01/07/2024
                                            Path:C:\Users\user\Desktop\rQuotation.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\rQuotation.exe"
                                            Imagebase:0x1910e580000
                                            File size:1'876'079 bytes
                                            MD5 hash:19C0BB3B7E9C41E5D47B78566E04D3DE
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1792962996.00000191105E8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1793385325.000001912044B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:12:42:55
                                            Start date:01/07/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:12:42:58
                                            Start date:01/07/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                            Imagebase:0xd10000
                                            File size:65'440 bytes
                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2873010607.0000000002EFE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2873010607.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2873010607.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2873010607.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2871449833.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Target ID:4
                                            Start time:12:42:58
                                            Start date:01/07/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                            Imagebase:0x100000
                                            File size:65'440 bytes
                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:12:42:58
                                            Start date:01/07/2024
                                            Path:C:\Windows\System32\WerFault.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\WerFault.exe -u -p 6476 -s 1120
                                            Imagebase:0x7ff6e1ed0000
                                            File size:570'736 bytes
                                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:11.4%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:6
                                              Total number of Limit Nodes:0
                                              execution_graph 13784 7ffd9b890da5 13785 7ffd9b890df8 FreeConsole 13784->13785 13787 7ffd9b890e4e 13785->13787 13780 7ffd9b89497a 13781 7ffd9b894989 VirtualProtect 13780->13781 13783 7ffd9b894a61 13781->13783
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: x6' $x6'
                                              • API String ID: 0-3101763461
                                              • Opcode ID: df5d4f2b8fac109685e95dc133689bc215c705aa00c52442a84a700472390ead
                                              • Instruction ID: 7e5fcce5f3c099a6f232f9e2b6edabd36cac5024022efd9d0db0e5b27824d256
                                              • Opcode Fuzzy Hash: df5d4f2b8fac109685e95dc133689bc215c705aa00c52442a84a700472390ead
                                              • Instruction Fuzzy Hash: BDB27B3071DB4A4FD769DB28C4A14B5B7E2FF89301B0446BED48AC72A6DE34E946C781
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796675546.00007FFD9B970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B970000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b970000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 87'
                                              • API String ID: 0-3562303210
                                              • Opcode ID: 93394df336d59875baac7137924dd2855474bd93791eeee351eadc028027618f
                                              • Instruction ID: 07674f9a76eb31e171882a4354f418e25f82e908274b93809fc58aaa6565caf8
                                              • Opcode Fuzzy Hash: 93394df336d59875baac7137924dd2855474bd93791eeee351eadc028027618f
                                              • Instruction Fuzzy Hash: 33E27F71A1E7CA5FDB66DB6888A55A47FE0FF56700F0901FED089CB1A3DA286906C341

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1400 7ffd9b89ab20-7ffd9b89e725 1402 7ffd9b89e727-7ffd9b89e76e 1400->1402 1403 7ffd9b89e76f-7ffd9b89e799 1400->1403 1402->1403 1405 7ffd9b89e79b-7ffd9b89e7b0 1403->1405 1406 7ffd9b89e7b2 1403->1406 1408 7ffd9b89e7b4-7ffd9b89e7b9 1405->1408 1406->1408 1410 7ffd9b89e8b6-7ffd9b89e8d6 1408->1410 1411 7ffd9b89e7bf-7ffd9b89e7ce 1408->1411 1413 7ffd9b89e927-7ffd9b89e932 1410->1413 1415 7ffd9b89e7d8-7ffd9b89e7d9 1411->1415 1416 7ffd9b89e7d0-7ffd9b89e7d6 1411->1416 1417 7ffd9b89e8d8-7ffd9b89e8de 1413->1417 1418 7ffd9b89e934-7ffd9b89e943 1413->1418 1421 7ffd9b89e7db-7ffd9b89e7fe 1415->1421 1416->1421 1419 7ffd9b89eda2-7ffd9b89edba 1417->1419 1420 7ffd9b89e8e4-7ffd9b89e905 call 7ffd9b89ab00 1417->1420 1427 7ffd9b89e945-7ffd9b89e957 1418->1427 1428 7ffd9b89e959 1418->1428 1430 7ffd9b89edbc-7ffd9b89edf7 call 7ffd9b89a408 1419->1430 1431 7ffd9b89ee04-7ffd9b89ee19 call 7ffd9b895bb8 1419->1431 1437 7ffd9b89e90a-7ffd9b89e924 1420->1437 1426 7ffd9b89e853-7ffd9b89e85e 1421->1426 1433 7ffd9b89e800-7ffd9b89e806 1426->1433 1434 7ffd9b89e860-7ffd9b89e877 1426->1434 1429 7ffd9b89e95b-7ffd9b89e960 1427->1429 1428->1429 1435 7ffd9b89e966-7ffd9b89e988 call 7ffd9b89ab00 1429->1435 1436 7ffd9b89e9ec-7ffd9b89ea00 1429->1436 1483 7ffd9b89edf9-7ffd9b89ee02 1430->1483 1484 7ffd9b89ee41-7ffd9b89ee4b 1430->1484 1454 7ffd9b89ee1e-7ffd9b89ee31 1431->1454 1433->1419 1438 7ffd9b89e80c-7ffd9b89e850 call 7ffd9b89ab00 1433->1438 1444 7ffd9b89e8a6-7ffd9b89e8b1 call 7ffd9b89a888 1434->1444 1445 7ffd9b89e879-7ffd9b89e89f call 7ffd9b89ab00 1434->1445 1470 7ffd9b89e9b6-7ffd9b89e9b7 1435->1470 1471 7ffd9b89e98a-7ffd9b89e9b4 1435->1471 1441 7ffd9b89ea50-7ffd9b89ea5f 1436->1441 1442 7ffd9b89ea02-7ffd9b89ea08 1436->1442 1437->1413 1438->1426 1465 7ffd9b89ea6c 1441->1465 1466 7ffd9b89ea61-7ffd9b89ea6a 1441->1466 1450 7ffd9b89ea27-7ffd9b89ea3f 1442->1450 1451 7ffd9b89ea0a-7ffd9b89ea25 1442->1451 1444->1436 1445->1444 1460 7ffd9b89ea48-7ffd9b89ea4b 1450->1460 1451->1450 1480 7ffd9b89ee3c-7ffd9b89ee3f 1454->1480 1481 7ffd9b89ee33-7ffd9b89ee3b 1454->1481 1467 7ffd9b89ebf8-7ffd9b89ec0d 1460->1467 1473 7ffd9b89ea6e-7ffd9b89ea73 1465->1473 1466->1473 1494 7ffd9b89ec4d 1467->1494 1495 7ffd9b89ec0f-7ffd9b89ec4b 1467->1495 1482 7ffd9b89e9b9-7ffd9b89e9c0 1470->1482 1471->1482 1475 7ffd9b89ea79-7ffd9b89ea7c 1473->1475 1476 7ffd9b89ed7f-7ffd9b89ed80 1473->1476 1485 7ffd9b89ea7e-7ffd9b89ea9b call 7ffd9b890188 1475->1485 1486 7ffd9b89eac4 1475->1486 1491 7ffd9b89ed83-7ffd9b89ed92 1476->1491 1480->1484 1481->1480 1482->1436 1492 7ffd9b89e9c2-7ffd9b89e9e7 call 7ffd9b89ab28 1482->1492 1483->1431 1488 7ffd9b89ee56-7ffd9b89ee67 1484->1488 1489 7ffd9b89ee4d-7ffd9b89ee55 1484->1489 1485->1486 1527 7ffd9b89ea9d-7ffd9b89eac2 1485->1527 1496 7ffd9b89eac6-7ffd9b89eacb 1486->1496 1497 7ffd9b89ee69-7ffd9b89ee71 1488->1497 1498 7ffd9b89ee72-7ffd9b89eead 1488->1498 1489->1488 1524 7ffd9b89ed93-7ffd9b89ed9b 1491->1524 1492->1436 1509 7ffd9b89ed6e-7ffd9b89ed7e 1492->1509 1508 7ffd9b89ec4f-7ffd9b89ec54 1494->1508 1495->1508 1504 7ffd9b89ebcc-7ffd9b89ebef 1496->1504 1505 7ffd9b89ead1-7ffd9b89eadd 1496->1505 1497->1498 1513 7ffd9b89eeb4-7ffd9b89eebf 1498->1513 1514 7ffd9b89eeaf call 7ffd9b89c8b0 1498->1514 1516 7ffd9b89ebf5-7ffd9b89ebf6 1504->1516 1505->1419 1512 7ffd9b89eae3-7ffd9b89eaf2 1505->1512 1510 7ffd9b89ec56-7ffd9b89ec5b 1508->1510 1511 7ffd9b89ecc4-7ffd9b89ecd8 1508->1511 1521 7ffd9b89ec5e-7ffd9b89ecad call 7ffd9b895af0 1510->1521 1519 7ffd9b89ed27-7ffd9b89ed33 call 7ffd9b8987a0 1511->1519 1520 7ffd9b89ecda-7ffd9b89ed05 call 7ffd9b895af0 1511->1520 1522 7ffd9b89eb05-7ffd9b89eb12 call 7ffd9b890188 1512->1522 1523 7ffd9b89eaf4-7ffd9b89eb03 1512->1523 1534 7ffd9b89eed1 1513->1534 1535 7ffd9b89eec1-7ffd9b89eecf 1513->1535 1514->1513 1516->1467 1533 7ffd9b89ed34-7ffd9b89ed4c 1519->1533 1549 7ffd9b89ed0a-7ffd9b89ed12 1520->1549 1566 7ffd9b89ed1e-7ffd9b89ed23 1521->1566 1567 7ffd9b89ecaf-7ffd9b89ecb3 1521->1567 1538 7ffd9b89eb18-7ffd9b89eb1e 1522->1538 1523->1538 1524->1419 1527->1496 1533->1419 1539 7ffd9b89ed4e-7ffd9b89ed5e 1533->1539 1541 7ffd9b89eed3-7ffd9b89eed8 1534->1541 1535->1541 1544 7ffd9b89eb20-7ffd9b89eb4d 1538->1544 1545 7ffd9b89eb53-7ffd9b89eb58 1538->1545 1546 7ffd9b89ed60-7ffd9b89ed6b 1539->1546 1547 7ffd9b89eeda-7ffd9b89eeed call 7ffd9b894be0 1541->1547 1548 7ffd9b89eeef-7ffd9b89eef7 call 7ffd9b895b08 1541->1548 1544->1545 1545->1419 1553 7ffd9b89eb5e-7ffd9b89eb7e 1545->1553 1546->1509 1560 7ffd9b89eefc-7ffd9b89ef03 1547->1560 1548->1560 1549->1491 1550 7ffd9b89ed14-7ffd9b89ed17 1549->1550 1550->1524 1556 7ffd9b89ed19 1550->1556 1564 7ffd9b89eb80-7ffd9b89eb91 1553->1564 1565 7ffd9b89eb92-7ffd9b89ebc2 call 7ffd9b89a658 1553->1565 1556->1546 1561 7ffd9b89ed1b 1556->1561 1561->1566 1564->1565 1573 7ffd9b89ebc7-7ffd9b89ebca 1565->1573 1566->1519 1567->1533 1569 7ffd9b89ecb5-7ffd9b89ecbe 1567->1569 1569->1521 1572 7ffd9b89ecbe 1569->1572 1572->1511 1572->1521 1573->1467
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: =M_H
                                              • API String ID: 0-509831626
                                              • Opcode ID: 7dac87b4f28c2080341fce674063d34d9046706bef8eaf95a5e72f384dbdeedb
                                              • Instruction ID: d615ad4a06aa03404073b0f962c0c2519f8cab0db15ed471538b15ad04ec5afa
                                              • Opcode Fuzzy Hash: 7dac87b4f28c2080341fce674063d34d9046706bef8eaf95a5e72f384dbdeedb
                                              • Instruction Fuzzy Hash: 1C520830B09A0D8FDF68DB68C465A797BE1FF59301B1501BEE08EC76A2DE24ED468741

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1574 7ffd9b89cb84-7ffd9b89cbc5 call 7ffd9b89a7f8 1579 7ffd9b89cc46-7ffd9b89cc4e 1574->1579 1580 7ffd9b89cbc7-7ffd9b89cc28 call 7ffd9b898b40 1574->1580 1584 7ffd9b89cc2a-7ffd9b89cc43 1580->1584 1585 7ffd9b89cc4f-7ffd9b89ccac 1580->1585 1584->1579 1588 7ffd9b89ccf6-7ffd9b89cd1f call 7ffd9b89c8b0 call 7ffd9b8987a0 1585->1588 1589 7ffd9b89ccae-7ffd9b89ccd9 1585->1589 1590 7ffd9b89ce1c-7ffd9b89ce29 1588->1590 1599 7ffd9b89cd25-7ffd9b89cd4f call 7ffd9b899310 1588->1599 1589->1590 1591 7ffd9b89ccdf-7ffd9b89ccf2 1589->1591 1596 7ffd9b89ce2b 1590->1596 1597 7ffd9b89ce31 1590->1597 1591->1588 1596->1597 1600 7ffd9b89ce35-7ffd9b89ce4a 1597->1600 1601 7ffd9b89ce33 1597->1601 1611 7ffd9b89cd5d-7ffd9b89cd7a 1599->1611 1612 7ffd9b89cd51-7ffd9b89cd5b 1599->1612 1607 7ffd9b89ce4c-7ffd9b89ce73 1600->1607 1608 7ffd9b89ce94-7ffd9b89cea9 call 7ffd9b8987a0 1600->1608 1603 7ffd9b89ce75 1601->1603 1604 7ffd9b89ce34 1601->1604 1609 7ffd9b89ce7b-7ffd9b89ce92 1603->1609 1610 7ffd9b89cf73-7ffd9b89cf83 1603->1610 1604->1600 1607->1603 1608->1610 1620 7ffd9b89ceaf-7ffd9b89cf15 call 7ffd9b899310 * 4 1608->1620 1609->1608 1618 7ffd9b89cf85-7ffd9b89cfac 1610->1618 1619 7ffd9b89cd7e-7ffd9b89cd83 1611->1619 1612->1611 1615 7ffd9b89cd7c 1612->1615 1615->1619 1631 7ffd9b89cff6-7ffd9b89d033 call 7ffd9b89c8b0 * 2 call 7ffd9b8987a0 1618->1631 1632 7ffd9b89cfae-7ffd9b89cfb1 1618->1632 1622 7ffd9b89cd85-7ffd9b89cd8c 1619->1622 1623 7ffd9b89cdea-7ffd9b89cdf2 1619->1623 1664 7ffd9b89cf17-7ffd9b89cf19 1620->1664 1665 7ffd9b89cf1b-7ffd9b89cf1c 1620->1665 1626 7ffd9b89cde5 1622->1626 1627 7ffd9b89cd8e-7ffd9b89cd91 1622->1627 1623->1590 1628 7ffd9b89cdf4-7ffd9b89ce06 1623->1628 1626->1604 1633 7ffd9b89cde7-7ffd9b89cde8 1626->1633 1634 7ffd9b89ce12-7ffd9b89ce1b 1627->1634 1635 7ffd9b89cd93-7ffd9b89cd96 1627->1635 1636 7ffd9b89ce0c-7ffd9b89ce11 1628->1636 1661 7ffd9b89d203-7ffd9b89d265 call 7ffd9b89cc80 1631->1661 1667 7ffd9b89d039-7ffd9b89d054 1631->1667 1638 7ffd9b89cfb2 1632->1638 1633->1636 1639 7ffd9b89cd98-7ffd9b89cd9e 1635->1639 1640 7ffd9b89cda0-7ffd9b89cda3 1635->1640 1636->1634 1644 7ffd9b89cfd8-7ffd9b89cfd9 1638->1644 1645 7ffd9b89cfb4-7ffd9b89cfb5 1638->1645 1639->1640 1646 7ffd9b89cda5-7ffd9b89cdba 1640->1646 1647 7ffd9b89cdbc-7ffd9b89cdce 1640->1647 1660 7ffd9b89cfdf-7ffd9b89cff5 1644->1660 1644->1661 1651 7ffd9b89cfba-7ffd9b89cfcc 1645->1651 1646->1647 1647->1590 1649 7ffd9b89cdd0-7ffd9b89cde8 1647->1649 1649->1636 1655 7ffd9b89cfd1-7ffd9b89cfd7 1651->1655 1655->1644 1660->1631 1668 7ffd9b89cf25-7ffd9b89cf2c 1664->1668 1665->1668 1670 7ffd9b89d056-7ffd9b89d059 1667->1670 1671 7ffd9b89d0ad-7ffd9b89d0b6 1667->1671 1668->1618 1672 7ffd9b89cf2e-7ffd9b89cf31 1668->1672 1674 7ffd9b89d0da-7ffd9b89d112 1670->1674 1675 7ffd9b89d05b-7ffd9b89d07b 1670->1675 1677 7ffd9b89d129-7ffd9b89d131 1671->1677 1672->1638 1676 7ffd9b89cf33-7ffd9b89cf49 1672->1676 1674->1677 1688 7ffd9b89d0b8-7ffd9b89d0d7 1675->1688 1689 7ffd9b89d07d-7ffd9b89d0ab 1675->1689 1676->1651 1683 7ffd9b89cf4b-7ffd9b89cf50 1676->1683 1680 7ffd9b89d1a2-7ffd9b89d1b7 1677->1680 1681 7ffd9b89d133-7ffd9b89d138 1677->1681 1687 7ffd9b89d1b9-7ffd9b89d1c2 call 7ffd9b8959a0 1680->1687 1686 7ffd9b89d13a-7ffd9b89d17e call 7ffd9b898b40 1681->1686 1681->1687 1683->1655 1690 7ffd9b89cf52-7ffd9b89cf72 call 7ffd9b898b40 1683->1690 1686->1661 1703 7ffd9b89d184-7ffd9b89d1a1 1686->1703 1699 7ffd9b89d1c7-7ffd9b89d1d7 1687->1699 1701 7ffd9b89d0d9 1688->1701 1702 7ffd9b89d114-7ffd9b89d125 1688->1702 1689->1671 1699->1661 1704 7ffd9b89d1d9-7ffd9b89d202 1699->1704 1701->1674 1702->1677 1703->1680
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: mM_H
                                              • API String ID: 0-3580782184
                                              • Opcode ID: baa663e34bfd6a98505bf7c1a3ade60b795168aae9739bf36d422811576e69a6
                                              • Instruction ID: 2a6120256f988fff1b04770a66f132977bde0064ee8279896563962cd01e36cf
                                              • Opcode Fuzzy Hash: baa663e34bfd6a98505bf7c1a3ade60b795168aae9739bf36d422811576e69a6
                                              • Instruction Fuzzy Hash: 3C32AD3170DB4E4FEB69DB6884640757BD1FF99300B0545BED08AC32B2DE25E942C780

                                              Control-flow Graph

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fish
                                              • API String ID: 0-1064584243
                                              • Opcode ID: c7befa226689ea40cca3d0f6fdcb024dc0492ce1fc5ec40fb31490d2f965d9f7
                                              • Instruction ID: 13e16465c0c7f16df0fcb6d1be80c1be566559d6824fb683a62bf808dbc9d037
                                              • Opcode Fuzzy Hash: c7befa226689ea40cca3d0f6fdcb024dc0492ce1fc5ec40fb31490d2f965d9f7
                                              • Instruction Fuzzy Hash: 1A911B31B1DB4D0FEB6CEB6898654B977E1FF99310B01017EE49BC32A6ED24E9424681
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 283a31ef377dbf4da49987eeb832b315fb101071e8ca6af3c281ffa564d441aa
                                              • Instruction ID: fbb3e7891a25950791cb9eb3afc908edc4f38d4400ef6d9a3f5f61ed7c1c967d
                                              • Opcode Fuzzy Hash: 283a31ef377dbf4da49987eeb832b315fb101071e8ca6af3c281ffa564d441aa
                                              • Instruction Fuzzy Hash: 37122431A1DB894FDBADDB2888256B67BE1FF99310F1504BFD08AC71A2DE24D506C741
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6817a23d925f899ee0efdf254f88168b15ae89e53ac7f25fcb4482e37b7f95b0
                                              • Instruction ID: d1ced31fee3478e6cdb1685a24a980367369a3c077896829296890f5149fabe4
                                              • Opcode Fuzzy Hash: 6817a23d925f899ee0efdf254f88168b15ae89e53ac7f25fcb4482e37b7f95b0
                                              • Instruction Fuzzy Hash: F7E18C3160DB8A4FE72DCB2484A1171BBD2FF95301B1546BED4DAC72B2DE28B546C781
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 47f2e5ccfcea830ceed61046ab019ed5e8f768afcc629e066f98c516d0b921d2
                                              • Instruction ID: 2e9b020b4ce6c67b9df426ba0ec373330d55c2b59943268605d97986455e6501
                                              • Opcode Fuzzy Hash: 47f2e5ccfcea830ceed61046ab019ed5e8f768afcc629e066f98c516d0b921d2
                                              • Instruction Fuzzy Hash: 0A91E430B1C90E4BEB6CEBAC94657B976D2EF9C344F524079E41EC72E6DE28AD424241

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1940 7ffd9b89497a-7ffd9b894987 1941 7ffd9b894989-7ffd9b894991 1940->1941 1942 7ffd9b894992-7ffd9b8949a3 1940->1942 1941->1942 1943 7ffd9b8949a5-7ffd9b8949ad 1942->1943 1944 7ffd9b8949ae-7ffd9b894a5f VirtualProtect 1942->1944 1943->1944 1948 7ffd9b894a67-7ffd9b894a8f 1944->1948 1949 7ffd9b894a61 1944->1949 1949->1948
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 752037b8724faa5c9fdcaaeefd4060040c4f18b5c7224b0454c842a0a9409e42
                                              • Instruction ID: 64ff85e236b25f5085c3009cbc2bd500aa2244c439abe6a9f54a75056127bc13
                                              • Opcode Fuzzy Hash: 752037b8724faa5c9fdcaaeefd4060040c4f18b5c7224b0454c842a0a9409e42
                                              • Instruction Fuzzy Hash: 7041393090DB884FDB19DBA898566E87FF0EF56321F0802AFD059C31A3CF646856C792

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2008 7ffd9b890da5-7ffd9b890e4c FreeConsole 2011 7ffd9b890e4e 2008->2011 2012 7ffd9b890e54-7ffd9b890e7b 2008->2012 2011->2012
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796381434.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b890000_rQuotation.jbxd
                                              Similarity
                                              • API ID: ConsoleFree
                                              • String ID:
                                              • API String ID: 771614528-0
                                              • Opcode ID: aa02b2342981ec1c26a4d1d6bee88279dc2cbb56951b83e6efd9e4ca9ec11964
                                              • Instruction ID: 4ec3be754adfd4cabb180a257af3309bd609620906785272934344e1c6877487
                                              • Opcode Fuzzy Hash: aa02b2342981ec1c26a4d1d6bee88279dc2cbb56951b83e6efd9e4ca9ec11964
                                              • Instruction Fuzzy Hash: 9C31B33050D7488FDB19DFA8C849BE9BBF0EF56320F0442AFD089C7562D768A84ACB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796675546.00007FFD9B970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B970000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b970000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 87'
                                              • API String ID: 0-3562303210
                                              • Opcode ID: 2711b9306a28f495c644885e29dc572dee81a6583cb196e7e402ff2574bef2fd
                                              • Instruction ID: 880550af5d7db8ac4e605cb632823c9da0cf5fdae7bdd0991077cfb7e916b5dc
                                              • Opcode Fuzzy Hash: 2711b9306a28f495c644885e29dc572dee81a6583cb196e7e402ff2574bef2fd
                                              • Instruction Fuzzy Hash: 14713831A1DB8E5FDB6ADB6888A55A87BF0FF55304B0601FBD04EC71A3DE28A905C341
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1796675546.00007FFD9B970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B970000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd9b970000_rQuotation.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93d4653ec269509a540df8d4009fb95ab98fd4920d4d4dc5c68d09703fd411d7
                                              • Instruction ID: 776b30e219656134a6d8f5d86ecdc5e762961893c763bc330e1fb9eb66eb5e44
                                              • Opcode Fuzzy Hash: 93d4653ec269509a540df8d4009fb95ab98fd4920d4d4dc5c68d09703fd411d7
                                              • Instruction Fuzzy Hash: 63E0E535A0562D8ADF64EB48D891BE9B3B1EF98300F0041E6D55EA3291CB346A84CF52

                                              Execution Graph

                                              Execution Coverage:11.2%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:139
                                              Total number of Limit Nodes:20
                                              execution_graph 39940 2d80848 39942 2d8084e 39940->39942 39941 2d8091b 39942->39941 39946 2d8137f 39942->39946 39950 6792780 39942->39950 39954 6792790 39942->39954 39948 2d81383 39946->39948 39947 2d8136b 39947->39942 39948->39947 39958 2d88268 39948->39958 39951 679279f 39950->39951 40018 6792188 39951->40018 39955 679279f 39954->39955 39956 6792188 3 API calls 39955->39956 39957 67927c0 39956->39957 39957->39942 39959 2d88272 39958->39959 39960 2d8828c 39959->39960 39964 681fd31 39959->39964 39973 681fae3 39959->39973 39978 681faf0 39959->39978 39960->39948 39967 681fd3a 39964->39967 39968 681fb05 39964->39968 39965 681fd89 39965->39960 39966 681fd16 39966->39960 39967->39965 39983 2d8f240 39967->39983 39968->39966 39971 681fd31 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39968->39971 39972 681fd40 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39968->39972 39971->39968 39972->39968 39975 681fb05 39973->39975 39974 681fd16 39974->39960 39975->39974 39976 681fd31 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39975->39976 39977 681fd40 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39975->39977 39976->39975 39977->39975 39979 681fb05 39978->39979 39980 681fd16 39979->39980 39981 681fd31 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39979->39981 39982 681fd40 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39979->39982 39980->39960 39981->39979 39982->39979 39987 2d8f278 39983->39987 39999 2d8f268 39983->39999 39984 2d8f24e 39984->39960 39988 2d8f2ad 39987->39988 39989 2d8f285 39987->39989 39995 2d8f278 3 API calls 39988->39995 39996 2d8f268 3 API calls 39988->39996 40010 2d8f309 39988->40010 40015 2d8f349 39988->40015 39989->39984 39990 2d8f2ce 39990->39984 39991 2d8f2ca 39991->39990 39992 2d8f333 39991->39992 39993 2d8f396 GlobalMemoryStatusEx 39991->39993 39992->39984 39994 2d8f3c6 39993->39994 39994->39984 39995->39991 39996->39991 40000 2d8f285 39999->40000 40001 2d8f2ad 39999->40001 40000->39984 40006 2d8f278 3 API calls 40001->40006 40007 2d8f268 3 API calls 40001->40007 40008 2d8f349 GlobalMemoryStatusEx 40001->40008 40009 2d8f309 GlobalMemoryStatusEx 40001->40009 40002 2d8f2ce 40002->39984 40003 2d8f2ca 40003->40002 40004 2d8f396 GlobalMemoryStatusEx 40003->40004 40005 2d8f3c6 40004->40005 40005->39984 40006->40003 40007->40003 40008->40003 40009->40003 40011 2d8f32c 40010->40011 40012 2d8f333 40011->40012 40013 2d8f396 GlobalMemoryStatusEx 40011->40013 40012->39991 40014 2d8f3c6 40013->40014 40014->39991 40016 2d8f396 GlobalMemoryStatusEx 40015->40016 40017 2d8f3c6 40016->40017 40017->39991 40019 6792193 40018->40019 40022 679361c 40019->40022 40021 6794146 40021->40021 40023 6793627 40022->40023 40024 679486c 40023->40024 40026 67960e8 40023->40026 40024->40021 40028 6796109 40026->40028 40027 679612d 40027->40024 40028->40027 40030 6796298 40028->40030 40031 67962a5 40030->40031 40032 67962de 40031->40032 40034 679462c 40031->40034 40032->40027 40035 6794637 40034->40035 40036 6796750 40035->40036 40038 679463c 40035->40038 40039 6794647 40038->40039 40045 6796314 40039->40045 40041 67967bf 40049 679bae0 40041->40049 40058 679bac8 40041->40058 40042 67967f9 40042->40036 40046 679631f 40045->40046 40047 6797a48 40046->40047 40048 67960e8 3 API calls 40046->40048 40047->40041 40048->40047 40051 679bb11 40049->40051 40052 679bc11 40049->40052 40050 679bb1d 40050->40042 40051->40050 40067 679bd58 40051->40067 40070 679bd48 40051->40070 40052->40042 40053 679bb5d 40074 679d049 40053->40074 40078 679d058 40053->40078 40060 679bb11 40058->40060 40061 679bc11 40058->40061 40059 679bb1d 40059->40042 40060->40059 40065 679bd58 2 API calls 40060->40065 40066 679bd48 2 API calls 40060->40066 40061->40042 40062 679bb5d 40063 679d049 CreateWindowExW 40062->40063 40064 679d058 CreateWindowExW 40062->40064 40063->40061 40064->40061 40065->40062 40066->40062 40082 679bd98 40067->40082 40068 679bd62 40068->40053 40071 679bd58 40070->40071 40073 679bd98 2 API calls 40071->40073 40072 679bd62 40072->40053 40073->40072 40075 679d083 40074->40075 40076 679d132 40075->40076 40090 679df30 40075->40090 40080 679d083 40078->40080 40079 679d132 40079->40079 40080->40079 40081 679df30 CreateWindowExW 40080->40081 40081->40079 40083 679bd9d 40082->40083 40084 679bddc 40083->40084 40088 679c031 LoadLibraryExW 40083->40088 40089 679c040 LoadLibraryExW 40083->40089 40084->40068 40085 679bdd4 40085->40084 40086 679bfe0 GetModuleHandleW 40085->40086 40087 679c00d 40086->40087 40087->40068 40088->40085 40089->40085 40091 679df7e CreateWindowExW 40090->40091 40092 679df46 40090->40092 40094 679e0b4 40091->40094 40092->40076 39930 6793898 39931 67938de GetCurrentProcess 39930->39931 39933 6793929 39931->39933 39934 6793930 GetCurrentThread 39931->39934 39933->39934 39935 679396d GetCurrentProcess 39934->39935 39936 6793966 39934->39936 39937 67939a3 39935->39937 39936->39935 39938 67939cb GetCurrentThreadId 39937->39938 39939 67939fc 39938->39939 40095 2d870a0 40096 2d870e4 CheckRemoteDebuggerPresent 40095->40096 40097 2d87126 40096->40097 40098 6793ae0 DuplicateHandle 40099 6793b76 40098->40099
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-2392861976
                                              • Opcode ID: d92ed543eb6de89a99914fda1d5c5f232d453561ce8eca0c031e8145789046d9
                                              • Instruction ID: b9a143254c49b364079118ac72ecd5950a18f2b52699ac0bea36d9c62d58f7d3
                                              • Opcode Fuzzy Hash: d92ed543eb6de89a99914fda1d5c5f232d453561ce8eca0c031e8145789046d9
                                              • Instruction Fuzzy Hash: 2CD25730E00209CFCB64DB68C594AADB7B6FF89314F5485A9D509EB365EB30ED85CB80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-2392861976
                                              • Opcode ID: e850ed101d04833ff0687e02d735f2089618b099557afb399412dd4eb5a1887c
                                              • Instruction ID: 0647a5ffe13054e7ca5e161a1f95731341664fd9f7041a0f9d0cbc78af7a7c29
                                              • Opcode Fuzzy Hash: e850ed101d04833ff0687e02d735f2089618b099557afb399412dd4eb5a1887c
                                              • Instruction Fuzzy Hash: 2C527030E002098FDF64DB68D5907AEB7BAFB85310F24892AD509EF355DA35DC86CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2354 6817e20-6817e3e 2355 6817e40-6817e43 2354->2355 2356 6817e45-6817e5f 2355->2356 2357 6817e64-6817e67 2355->2357 2356->2357 2358 6817e74-6817e77 2357->2358 2359 6817e69-6817e73 2357->2359 2360 6817e79-6817e87 2358->2360 2361 6817e8e-6817e91 2358->2361 2369 6817ec6-6817edc 2360->2369 2370 6817e89 2360->2370 2363 6817e93-6817eaf 2361->2363 2364 6817eb4-6817eb6 2361->2364 2363->2364 2367 6817eb8 2364->2367 2368 6817ebd-6817ec0 2364->2368 2367->2368 2368->2355 2368->2369 2374 6817ee2-6817eeb 2369->2374 2375 68180f7-6818101 2369->2375 2370->2361 2376 6817ef1-6817f0e 2374->2376 2377 6818102-681810e 2374->2377 2385 68180e4-68180f1 2376->2385 2386 6817f14-6817f3c 2376->2386 2380 6818110-6818112 2377->2380 2381 6818116-6818119 2377->2381 2383 6818114-6818115 2380->2383 2384 681811a-6818137 2380->2384 2381->2384 2383->2381 2387 6818139-681813c 2384->2387 2385->2374 2385->2375 2386->2385 2403 6817f42-6817f4b 2386->2403 2388 6818142-6818151 2387->2388 2389 6818368-681836b 2387->2389 2396 6818170-68181ab 2388->2396 2397 6818153-681816e 2388->2397 2391 6818371-681837d 2389->2391 2392 6818422-6818425 2389->2392 2401 6818388-681838a 2391->2401 2394 6818427-6818443 2392->2394 2395 6818448-681844a 2392->2395 2394->2395 2398 6818451-6818454 2395->2398 2399 681844c 2395->2399 2415 68181b1-68181c2 2396->2415 2416 681833c-6818352 2396->2416 2397->2396 2398->2387 2406 681845a-6818463 2398->2406 2399->2398 2404 68183a2-68183a9 2401->2404 2405 681838c-6818392 2401->2405 2403->2377 2409 6817f51-6817f6d 2403->2409 2412 68183ab-68183b8 2404->2412 2413 68183ba 2404->2413 2410 6818394 2405->2410 2411 6818396-6818398 2405->2411 2423 6817f73-6817f9d 2409->2423 2424 68180d2-68180de 2409->2424 2410->2404 2411->2404 2414 68183bf-68183c1 2412->2414 2413->2414 2418 68183c3-68183c6 2414->2418 2419 68183d8-6818411 2414->2419 2428 6818327-6818336 2415->2428 2429 68181c8-68181e5 2415->2429 2416->2389 2418->2406 2419->2388 2442 6818417-6818421 2419->2442 2440 6817fa3-6817fcb 2423->2440 2441 68180c8-68180cd 2423->2441 2424->2385 2424->2403 2428->2415 2428->2416 2429->2428 2437 68181eb-68182e1 call 6816648 2429->2437 2491 68182e3-68182ed 2437->2491 2492 68182ef 2437->2492 2440->2441 2449 6817fd1-6817fff 2440->2449 2441->2424 2449->2441 2454 6818005-681800e 2449->2454 2454->2441 2455 6818014-6818046 2454->2455 2463 6818051-681806d 2455->2463 2464 6818048-681804c 2455->2464 2463->2424 2467 681806f-68180c6 call 6816648 2463->2467 2464->2441 2466 681804e 2464->2466 2466->2463 2467->2424 2493 68182f4-68182f6 2491->2493 2492->2493 2493->2428 2494 68182f8-68182fd 2493->2494 2495 681830b 2494->2495 2496 68182ff-6818309 2494->2496 2497 6818310-6818312 2495->2497 2496->2497 2497->2428 2498 6818314-6818320 2497->2498 2498->2428
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q
                                              • API String ID: 0-355816377
                                              • Opcode ID: c530fe195564dad9739e67665d8e83005d4da0704727d7289b0ef0ab3d1ac9b1
                                              • Instruction ID: 998ac5fb0605d7124e783ac129ad693610b0ec847c3a0bd7b4216821d6673990
                                              • Opcode Fuzzy Hash: c530fe195564dad9739e67665d8e83005d4da0704727d7289b0ef0ab3d1ac9b1
                                              • Instruction Fuzzy Hash: B902CE30B002098FDB54DF68D991AAEB7E6FF84304F148569D91ADB394DB31EC86CB81
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 02D87117
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2872922931.0000000002D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_2d80000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: 80088b0c379cde86b97673457dcf82f98b539d9a4b72c3774f2e4afbf048158c
                                              • Instruction ID: 1fc3fc0c09a4b2e85680f110d946a0684b873bbd7e5cb5e193314fc09678e24b
                                              • Opcode Fuzzy Hash: 80088b0c379cde86b97673457dcf82f98b539d9a4b72c3774f2e4afbf048158c
                                              • Instruction Fuzzy Hash: 742148B2800259CFDB10CF9AD844BEEFBF4AF49324F14846AE454A7350D778A944CF64
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bf066dc3ee7f10d5447e41af3e4420055a6044f42fe82d4f0e319f341830f000
                                              • Instruction ID: 153aeb6b0ae7c2be99108be84188a4f28e8e5edede70f3793a68337859e65266
                                              • Opcode Fuzzy Hash: bf066dc3ee7f10d5447e41af3e4420055a6044f42fe82d4f0e319f341830f000
                                              • Instruction Fuzzy Hash: D562AF30B002088FDB54DB68D994AADB7F6FF88314F148569E556EB354EB31EC86CB90
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3272f192aa04236fd1e2a5cb059b8d106a62a1ff7b51c2b6a7bf06a3762f3810
                                              • Instruction ID: fbb9e26dd13f31c3f3607eba6e652df605f6abd893ed89027c02538b53ec9581
                                              • Opcode Fuzzy Hash: 3272f192aa04236fd1e2a5cb059b8d106a62a1ff7b51c2b6a7bf06a3762f3810
                                              • Instruction Fuzzy Hash: 5D12F3B1F102059BDB60DB64D89476EBBBAFB85310F14842AD959DF344DB34EC42CB92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 526 681ad70-681ad8e 527 681ad90-681ad93 526->527 528 681ad95-681ad9e 527->528 529 681adad-681adb0 527->529 530 681ada4-681ada8 528->530 531 681afa7-681afb1 528->531 532 681adb6-681adb9 529->532 533 681af8d-681af96 529->533 530->529 540 681afb3-681afde 531->540 541 681b02f 531->541 534 681adbb-681adc8 532->534 535 681adcd-681add0 532->535 533->528 536 681af9c-681afa6 533->536 534->535 538 681ade0-681ade3 535->538 539 681add2-681addb 535->539 545 681adf4-681adf7 538->545 546 681ade4-681ade9 538->546 539->538 544 681afe0-681afe3 540->544 547 681b031-681b06c 541->547 548 681aff2-681aff5 544->548 549 681afe5 544->549 551 681adf9-681ae15 545->551 552 681ae1a-681ae1d 545->552 546->536 550 681adea-681adf0 546->550 559 681b072-681b07e 547->559 560 681b25f-681b272 547->560 556 681b002-681b005 548->556 557 681aff7-681b001 548->557 652 681afe5 call 681b2c8 549->652 653 681afe5 call 681b2d8 549->653 550->545 551->552 554 681ae27-681ae2a 552->554 555 681ae1f-681ae24 552->555 562 681ae44-681ae46 554->562 563 681ae2c-681ae3f 554->563 555->554 564 681b007-681b023 556->564 565 681b028-681b02b 556->565 577 681b080-681b099 559->577 578 681b09e-681b0e2 559->578 566 681b274 560->566 561 681afeb-681afed 561->548 567 681ae48 562->567 568 681ae4d-681ae50 562->568 563->562 564->565 565->541 569 681b294-681b297 565->569 566->569 567->568 568->527 576 681ae56-681ae7a 568->576 572 681b299-681b29d 569->572 573 681b2a8-681b2aa 569->573 572->547 579 681b2a3 572->579 580 681b2b1-681b2b4 573->580 581 681b2ac 573->581 587 681ae80-681ae8f 576->587 588 681af8a 576->588 577->566 599 681b0e4-681b0f6 578->599 600 681b0fe-681b13d 578->600 579->573 580->544 583 681b2ba-681b2c4 580->583 581->580 592 681ae91-681ae97 587->592 593 681aea7-681aee2 call 6816648 587->593 588->533 594 681ae99 592->594 595 681ae9b-681ae9d 592->595 614 681aee4-681aeea 593->614 615 681aefa-681af11 593->615 594->593 595->593 599->600 606 681b143-681b21e call 6816648 600->606 607 681b224-681b239 600->607 606->607 607->560 617 681aeec 614->617 618 681aeee-681aef0 614->618 623 681af13-681af19 615->623 624 681af29-681af3a 615->624 617->615 618->615 626 681af1b 623->626 627 681af1d-681af1f 623->627 630 681af52-681af83 624->630 631 681af3c-681af42 624->631 626->624 627->624 630->588 632 681af44 631->632 633 681af46-681af48 631->633 632->630 633->630 652->561 653->561
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-3823777903
                                              • Opcode ID: be58eaa1120043c20bf1b67a80e8c235dd0d2fabc95379756c655249a874a805
                                              • Instruction ID: 0e5f9acbd113f88c9c6a3d579ad4d7f517aa07af1e0d441794f489492fcf10c8
                                              • Opcode Fuzzy Hash: be58eaa1120043c20bf1b67a80e8c235dd0d2fabc95379756c655249a874a805
                                              • Instruction Fuzzy Hash: 43E16F30E102098FCB69DF69D9906AEB7B6FF88304F108529D51ADF354DB71E84ACB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1396 6793893-6793927 GetCurrentProcess 1400 6793929-679392f 1396->1400 1401 6793930-6793964 GetCurrentThread 1396->1401 1400->1401 1402 679396d-67939a1 GetCurrentProcess 1401->1402 1403 6793966-679396c 1401->1403 1405 67939aa-67939c5 call 6793a76 1402->1405 1406 67939a3-67939a9 1402->1406 1403->1402 1409 67939cb-67939fa GetCurrentThreadId 1405->1409 1406->1405 1410 67939fc-6793a02 1409->1410 1411 6793a03-6793a65 1409->1411 1410->1411
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 06793916
                                              • GetCurrentThread.KERNEL32 ref: 06793953
                                              • GetCurrentProcess.KERNEL32 ref: 06793990
                                              • GetCurrentThreadId.KERNEL32 ref: 067939E9
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: d568ee5e17326aec9eb522c164f1189678d6ef579824b7466255a32731f15095
                                              • Instruction ID: ded3c6f7445cabf16173af140a25d8e6ef697ac63368ffe86f8371d38f1d32a2
                                              • Opcode Fuzzy Hash: d568ee5e17326aec9eb522c164f1189678d6ef579824b7466255a32731f15095
                                              • Instruction Fuzzy Hash: BF5148B09003098FDB54DFA9D948BEEBBF1EF48314F248469D459A7360DB349984CF66

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1418 6793898-6793927 GetCurrentProcess 1422 6793929-679392f 1418->1422 1423 6793930-6793964 GetCurrentThread 1418->1423 1422->1423 1424 679396d-67939a1 GetCurrentProcess 1423->1424 1425 6793966-679396c 1423->1425 1427 67939aa-67939c5 call 6793a76 1424->1427 1428 67939a3-67939a9 1424->1428 1425->1424 1431 67939cb-67939fa GetCurrentThreadId 1427->1431 1428->1427 1432 67939fc-6793a02 1431->1432 1433 6793a03-6793a65 1431->1433 1432->1433
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 06793916
                                              • GetCurrentThread.KERNEL32 ref: 06793953
                                              • GetCurrentProcess.KERNEL32 ref: 06793990
                                              • GetCurrentThreadId.KERNEL32 ref: 067939E9
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 781293ef60da767a14ec56ec76c9701b0194faa4ed3d583c38e4bda85a8db6a0
                                              • Instruction ID: 4c35365ee031ea79b71670bb6c4c1ba437d1875a64957bb7ed421ebbbe9d9ab9
                                              • Opcode Fuzzy Hash: 781293ef60da767a14ec56ec76c9701b0194faa4ed3d583c38e4bda85a8db6a0
                                              • Instruction Fuzzy Hash: 855159B09003098FDB54DFA9D948BEEBBF1EF48314F248429D419A7350DB349984CF66

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1440 68191f8-681921d 1441 681921f-6819222 1440->1441 1442 6819ae0-6819ae3 1441->1442 1443 6819228-681923d 1441->1443 1444 6819ae5-6819b04 1442->1444 1445 6819b09-6819b0b 1442->1445 1450 6819255-681926b 1443->1450 1451 681923e-6819245 1443->1451 1444->1445 1447 6819b12-6819b15 1445->1447 1448 6819b0d 1445->1448 1447->1441 1449 6819b1b-6819b25 1447->1449 1448->1447 1457 6819276-6819278 1450->1457 1453 6819247 1451->1453 1454 6819249-681924b 1451->1454 1453->1450 1454->1450 1458 6819290-6819301 1457->1458 1459 681927a-6819280 1457->1459 1470 6819303-6819326 1458->1470 1471 681932d-6819349 1458->1471 1460 6819282 1459->1460 1461 6819284-6819286 1459->1461 1460->1458 1461->1458 1470->1471 1476 6819375-6819390 1471->1476 1477 681934b-681936e 1471->1477 1482 6819392-68193b4 1476->1482 1483 68193bb-68193d6 1476->1483 1477->1476 1482->1483 1488 68193d8-68193f4 1483->1488 1489 68193fb-6819409 1483->1489 1488->1489 1490 6819419-6819493 1489->1490 1491 681940b-6819414 1489->1491 1497 68194e0-68194f5 1490->1497 1498 6819495-68194b3 1490->1498 1491->1449 1497->1442 1502 68194b5-68194c4 1498->1502 1503 68194cf-68194de 1498->1503 1502->1503 1503->1497 1503->1498
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q
                                              • API String ID: 0-2125118731
                                              • Opcode ID: 934530ec96df749b04488703e2fcd2a38071e902f37bfc9e0b74329956fc934e
                                              • Instruction ID: 5112fd4180dd6ab4758fa791c852a1fbd1de6f3a22b44f4a745276e3754d32ba
                                              • Opcode Fuzzy Hash: 934530ec96df749b04488703e2fcd2a38071e902f37bfc9e0b74329956fc934e
                                              • Instruction Fuzzy Hash: 43914E30B0021A9FDF94DB69D9607AEB7F6BB88244F108569C50DEB358EA70DC468B91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1506 681cfe8-681d003 1507 681d005-681d008 1506->1507 1508 681d4d4-681d4e0 1507->1508 1509 681d00e-681d011 1507->1509 1512 681d085-681d094 1508->1512 1513 681d4e6-681d7d3 1508->1513 1510 681d013-681d02f 1509->1510 1511 681d034-681d037 1509->1511 1510->1511 1516 681d080-681d083 1511->1516 1517 681d039-681d07b 1511->1517 1514 681d0a3-681d0af 1512->1514 1515 681d096-681d09b 1512->1515 1721 681d7d9-681d7df 1513->1721 1722 681d9fa-681da04 1513->1722 1521 681da05-681da18 1514->1521 1522 681d0b5-681d0c7 1514->1522 1515->1514 1516->1512 1519 681d0cc-681d0cf 1516->1519 1517->1516 1523 681d0d1-681d113 1519->1523 1524 681d118-681d11b 1519->1524 1534 681da22-681da3e 1521->1534 1535 681da1a 1521->1535 1522->1519 1523->1524 1529 681d164-681d167 1524->1529 1530 681d11d-681d12c 1524->1530 1536 681d1b0-681d1b3 1529->1536 1537 681d169-681d1ab 1529->1537 1538 681d13b-681d147 1530->1538 1539 681d12e-681d133 1530->1539 1544 681da40-681da43 1534->1544 1535->1534 1543 681da1c-681da1f 1535->1543 1540 681d1b5-681d1f7 1536->1540 1541 681d1fc-681d1ff 1536->1541 1537->1536 1538->1521 1542 681d14d-681d15f 1538->1542 1539->1538 1540->1541 1551 681d201-681d217 1541->1551 1552 681d21c-681d21f 1541->1552 1542->1529 1543->1534 1549 681da52-681da55 1544->1549 1550 681da45 1544->1550 1557 681da57-681da83 1549->1557 1558 681da88-681da8b 1549->1558 1768 681da45 call 681db70 1550->1768 1769 681da45 call 681db5d 1550->1769 1551->1552 1555 681d221-681d263 1552->1555 1556 681d268-681d26b 1552->1556 1555->1556 1564 681d27a-681d27d 1556->1564 1565 681d26d-681d26f 1556->1565 1557->1558 1566 681da8d-681daa9 1558->1566 1567 681daae-681dab0 1558->1567 1563 681da4b-681da4d 1563->1549 1570 681d2c6-681d2c9 1564->1570 1571 681d27f-681d2c1 1564->1571 1576 681d275 1565->1576 1577 681d38f-681d398 1565->1577 1566->1567 1574 681dab2 1567->1574 1575 681dab7-681daba 1567->1575 1579 681d2d3-681d2d6 1570->1579 1580 681d2cb-681d2d0 1570->1580 1571->1570 1574->1575 1575->1544 1585 681dabc-681dacb 1575->1585 1576->1564 1581 681d3a7-681d3b3 1577->1581 1582 681d39a-681d39f 1577->1582 1591 681d2d8-681d31a 1579->1591 1592 681d31f-681d322 1579->1592 1580->1579 1593 681d4c4-681d4c9 1581->1593 1594 681d3b9-681d3cd 1581->1594 1582->1581 1611 681db32-681db47 1585->1611 1612 681dacd-681db30 call 6816648 1585->1612 1591->1592 1599 681d324-681d366 1592->1599 1600 681d36b-681d36e 1592->1600 1613 681d4d1 1593->1613 1594->1613 1618 681d3d3-681d3e5 1594->1618 1599->1600 1605 681d370-681d372 1600->1605 1606 681d37d-681d37f 1600->1606 1605->1613 1614 681d378 1605->1614 1615 681d381 1606->1615 1616 681d386-681d389 1606->1616 1612->1611 1613->1508 1614->1606 1615->1616 1616->1507 1616->1577 1633 681d3e7-681d3ed 1618->1633 1634 681d409-681d40b 1618->1634 1639 681d3f1-681d3fd 1633->1639 1640 681d3ef 1633->1640 1638 681d415-681d421 1634->1638 1653 681d423-681d42d 1638->1653 1654 681d42f 1638->1654 1644 681d3ff-681d407 1639->1644 1640->1644 1644->1638 1656 681d434-681d436 1653->1656 1654->1656 1656->1613 1657 681d43c-681d458 call 6816648 1656->1657 1667 681d467-681d473 1657->1667 1668 681d45a-681d45f 1657->1668 1667->1593 1669 681d475-681d4c2 1667->1669 1668->1667 1669->1613 1723 681d7e1-681d7e6 1721->1723 1724 681d7ee-681d7f7 1721->1724 1723->1724 1724->1521 1725 681d7fd-681d810 1724->1725 1727 681d816-681d81c 1725->1727 1728 681d9ea-681d9f4 1725->1728 1729 681d82b-681d834 1727->1729 1730 681d81e-681d823 1727->1730 1728->1721 1728->1722 1729->1521 1731 681d83a-681d85b 1729->1731 1730->1729 1734 681d86a-681d873 1731->1734 1735 681d85d-681d862 1731->1735 1734->1521 1736 681d879-681d896 1734->1736 1735->1734 1736->1728 1739 681d89c-681d8a2 1736->1739 1739->1521 1740 681d8a8-681d8c1 1739->1740 1742 681d8c7-681d8ee 1740->1742 1743 681d9dd-681d9e4 1740->1743 1742->1521 1746 681d8f4-681d8fe 1742->1746 1743->1728 1743->1739 1746->1521 1747 681d904-681d91b 1746->1747 1749 681d92a-681d945 1747->1749 1750 681d91d-681d928 1747->1750 1749->1743 1755 681d94b-681d964 call 6816648 1749->1755 1750->1749 1759 681d973-681d97c 1755->1759 1760 681d966-681d96b 1755->1760 1759->1521 1761 681d982-681d9d6 1759->1761 1760->1759 1761->1743 1768->1563 1769->1563
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q
                                              • API String ID: 0-831282457
                                              • Opcode ID: 7c6f8a17dec2735029a8af905fc7ce8f04939cc44c93563b09902c2d541d5b1f
                                              • Instruction ID: 5b4eaeff113ccbe4570d2de68ab5870ee2b5fcb1bcda47d8e8e29df8face84c1
                                              • Opcode Fuzzy Hash: 7c6f8a17dec2735029a8af905fc7ce8f04939cc44c93563b09902c2d541d5b1f
                                              • Instruction Fuzzy Hash: 58623F30A0061A8FCB55EB69D590A5DB7B2FF84304F248A69D409DF359DB71FC8ACB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1770 6814c40-6814c64 1771 6814c66-6814c69 1770->1771 1772 6814c6b-6814c85 1771->1772 1773 6814c8a-6814c8d 1771->1773 1772->1773 1774 6814c93-6814d8b 1773->1774 1775 681536c-681536e 1773->1775 1793 6814d91-6814dd9 1774->1793 1794 6814e0e-6814e15 1774->1794 1777 6815370 1775->1777 1778 6815375-6815378 1775->1778 1777->1778 1778->1771 1779 681537e-681538b 1778->1779 1816 6814dde call 68154f1 1793->1816 1817 6814dde call 6815500 1793->1817 1795 6814e99-6814ea2 1794->1795 1796 6814e1b-6814e8b 1794->1796 1795->1779 1813 6814e96 1796->1813 1814 6814e8d 1796->1814 1807 6814de4-6814e00 1810 6814e02 1807->1810 1811 6814e0b-6814e0c 1807->1811 1810->1811 1811->1794 1813->1795 1814->1813 1816->1807 1817->1807
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fcq$XPcq$\Ocq
                                              • API String ID: 0-3575482020
                                              • Opcode ID: ed7f0047baa2804a2ffbfc0e8f5881f29b6e58a00f528fc92682be9ffe46b673
                                              • Instruction ID: 7eb4ee0315228af64a94431fb3104a18a825569ca026798cc68a59acc549f10b
                                              • Opcode Fuzzy Hash: ed7f0047baa2804a2ffbfc0e8f5881f29b6e58a00f528fc92682be9ffe46b673
                                              • Instruction Fuzzy Hash: 5E617D70E002099FDB54EFA8C8547AEBBF6FB88700F20842AD509EB394DE759D058B91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2736 68191e8-68191e9 2737 68191f2 2736->2737 2738 68191ec 2736->2738 2739 68191f4-68191f5 2737->2739 2740 68191fa-681921d 2737->2740 2741 681924f 2738->2741 2742 68191ee 2738->2742 2743 68191f6-68191f7 2739->2743 2744 681921f-6819222 2740->2744 2745 6819251-6819253 2741->2745 2746 6819239-681923d 2741->2746 2742->2743 2747 68191f0-68191f1 2742->2747 2743->2740 2748 6819ae0-6819ae3 2744->2748 2749 6819228-6819230 2744->2749 2750 6819255-681926b 2745->2750 2746->2750 2751 681923e-6819245 2746->2751 2747->2737 2752 6819ae5-6819b04 2748->2752 2753 6819b09-6819b0b 2748->2753 2749->2746 2761 6819276-6819278 2750->2761 2754 6819247 2751->2754 2755 6819249-681924b 2751->2755 2752->2753 2757 6819b12-6819b15 2753->2757 2758 6819b0d 2753->2758 2754->2750 2755->2750 2757->2744 2759 6819b1b-6819b25 2757->2759 2758->2757 2762 6819290-6819301 2761->2762 2763 681927a-6819280 2761->2763 2775 6819303-6819326 2762->2775 2776 681932d-6819349 2762->2776 2765 6819282 2763->2765 2766 6819284-6819286 2763->2766 2765->2762 2766->2762 2775->2776 2781 6819375-6819390 2776->2781 2782 681934b-681936e 2776->2782 2787 6819392-68193b4 2781->2787 2788 68193bb-68193d6 2781->2788 2782->2781 2787->2788 2793 68193d8-68193f4 2788->2793 2794 68193fb-6819409 2788->2794 2793->2794 2795 6819419-6819493 2794->2795 2796 681940b-6819414 2794->2796 2802 68194e0-68194f5 2795->2802 2803 6819495-68194b3 2795->2803 2796->2759 2802->2748 2807 68194b5-68194c4 2803->2807 2808 68194cf-68194de 2803->2808 2807->2808 2808->2802 2808->2803
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q
                                              • API String ID: 0-355816377
                                              • Opcode ID: be46eb64c0a914d6e2b6d8e3809f406cdc3bdcff5e3464ff358718a8ecdb36fa
                                              • Instruction ID: 23bfc5eb709be3a4d75ac409873cb9ac3d90db4ec3f1866d590f57c42c1a1a2f
                                              • Opcode Fuzzy Hash: be46eb64c0a914d6e2b6d8e3809f406cdc3bdcff5e3464ff358718a8ecdb36fa
                                              • Instruction Fuzzy Hash: 17517330B002099FDF94DB78D9A0BAE77FABBC8654F108569C519DB358DA30DC42CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2811 6814c08-6814c32 2814 6814c34-6814c39 2811->2814 2815 6814c3a 2811->2815 2814->2815 2816 6814c42-6814c64 2815->2816 2817 6814c3c-6814c3f 2815->2817 2818 6814c66-6814c69 2816->2818 2817->2816 2819 6814c6b-6814c85 2818->2819 2820 6814c8a-6814c8d 2818->2820 2819->2820 2821 6814c93-6814d8b 2820->2821 2822 681536c-681536e 2820->2822 2840 6814d91-6814dd9 2821->2840 2841 6814e0e-6814e15 2821->2841 2824 6815370 2822->2824 2825 6815375-6815378 2822->2825 2824->2825 2825->2818 2826 681537e-681538b 2825->2826 2863 6814dde call 68154f1 2840->2863 2864 6814dde call 6815500 2840->2864 2842 6814e99-6814ea2 2841->2842 2843 6814e1b-6814e8b 2841->2843 2842->2826 2860 6814e96 2843->2860 2861 6814e8d 2843->2861 2854 6814de4-6814e00 2857 6814e02 2854->2857 2858 6814e0b-6814e0c 2854->2858 2857->2858 2858->2841 2860->2842 2861->2860 2863->2854 2864->2854
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fcq$XPcq
                                              • API String ID: 0-936005338
                                              • Opcode ID: 51be1a462e264cf716dd1ab042e92715a7be81a096ca660feea841c0510693b8
                                              • Instruction ID: 2262c2d8ba5dc7038adbc7974d490fec3346216d707848c77fc04b34ec253429
                                              • Opcode Fuzzy Hash: 51be1a462e264cf716dd1ab042e92715a7be81a096ca660feea841c0510693b8
                                              • Instruction Fuzzy Hash: 7951BD70A002188FDB45EFB8C8647AEBBF6FF88700F20852AD505EB395DA718C05CB95
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0679BFFE
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: ba7000592973ad28dea2d68fb610afca865fca3a804eb7afcf307db3e72c94e6
                                              • Instruction ID: 8573cc0aa98e2e576bee7c11c0222760c7cee4ee85b1309a4c548e8b1d66c45f
                                              • Opcode Fuzzy Hash: ba7000592973ad28dea2d68fb610afca865fca3a804eb7afcf307db3e72c94e6
                                              • Instruction Fuzzy Hash: 94813570A00B058FDBA4DF2AE44576BBBF5BF88704F00892ED58697A50DB74E845CBA1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 80615c445f9af50cc829d6f01840eb593326e5a8fc08b588e1f8d1ec9d2d0cd0
                                              • Instruction ID: 28d65700633f944d1fda7e6b4316c657ed598a2345f19a14aa452e51f0fa3fe1
                                              • Opcode Fuzzy Hash: 80615c445f9af50cc829d6f01840eb593326e5a8fc08b588e1f8d1ec9d2d0cd0
                                              • Instruction Fuzzy Hash: 585113B1C10249AFDF11CF99D980ADEBFB5FF49314F24816AE808AB221D7319845CFA1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2872922931.0000000002D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_2d80000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b7c12b197ff811c683ab95049b80f93f2aae2490625e1099961fb3885937587b
                                              • Instruction ID: 5b8cfbb12e8e6af6079f1992c80886bce6aae2854621f7fce7924df40d07edd9
                                              • Opcode Fuzzy Hash: b7c12b197ff811c683ab95049b80f93f2aae2490625e1099961fb3885937587b
                                              • Instruction Fuzzy Hash: CA415472D043598FCB04DFB9D8102AEBFF0AF89220F18856AD444E7751DB38A845CBD1
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0679E0A2
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 71fb7885c3bf5b9ab66c9e2aab36c2ff6b24093ffab80565bdaa994c30b73432
                                              • Instruction ID: f156e52ace4d2443d0b513444fe1018bed7ef2a96a76fbca39ae79a99039718b
                                              • Opcode Fuzzy Hash: 71fb7885c3bf5b9ab66c9e2aab36c2ff6b24093ffab80565bdaa994c30b73432
                                              • Instruction Fuzzy Hash: 9341BEB1D103099FDF14CF99D984ADEBBF5BF48314F24852AE818AB210DB71A885CF91
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 02D87117
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2872922931.0000000002D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_2d80000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: d1ea80d600909b210b56a703a07a0a19b72db4e38924473058a99f4cde0f1787
                                              • Instruction ID: 984d5c72d92b5c999033c230006a9a761bac398b4c22ba8540521519061c1471
                                              • Opcode Fuzzy Hash: d1ea80d600909b210b56a703a07a0a19b72db4e38924473058a99f4cde0f1787
                                              • Instruction Fuzzy Hash: 7E2139B28002598FDB10CF9AD984BEEFBF4EF49324F14845AE454A7350D778A944CF64
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06793B67
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 84ced876c954f886032b18fbeed77f67bc2245045463d6352827a9c3d4b9cdf2
                                              • Instruction ID: 3f3c038a45b9bc85a22ecd5276db9ca97f2b8159338f114eec40847770745da1
                                              • Opcode Fuzzy Hash: 84ced876c954f886032b18fbeed77f67bc2245045463d6352827a9c3d4b9cdf2
                                              • Instruction Fuzzy Hash: 0D21E4B5D00258DFDB10CFA9D984AEEBBF4EB48320F14842AE958A7350D374A944CFA5
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06793B67
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: f1938d7d837d171681e1ed37aa643654d35c67ec1755a7237c5668c3d624dd09
                                              • Instruction ID: ff9bf1fd8625690a5fbb4b72f42e9b9242fce1421e99922cfee644a17531e572
                                              • Opcode Fuzzy Hash: f1938d7d837d171681e1ed37aa643654d35c67ec1755a7237c5668c3d624dd09
                                              • Instruction Fuzzy Hash: BE21C2B5900258DFDB10CFAAD984ADEBBF4EB48324F14842AE958A7350D374A944CFA5
                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0679C079,00000800,00000000,00000000), ref: 0679C26A
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: da4a22ff90d1bf58f9629d5b4e564e589d28d8e57e688f6182e91e7b554de1e3
                                              • Instruction ID: 659e4ed9c22f8774a23fb28d7bdd8b052104d501a1e68e99cfe1d2558ca88ba1
                                              • Opcode Fuzzy Hash: da4a22ff90d1bf58f9629d5b4e564e589d28d8e57e688f6182e91e7b554de1e3
                                              • Instruction Fuzzy Hash: 911112B6D003488FDF10CF9AD944AEEFBF4EB48720F14842AE519A7210C375A544CFA5
                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0679C079,00000800,00000000,00000000), ref: 0679C26A
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 00b28404818705fe61c484bfcc1e97110dd978cfd2c06e10edb677b914630c5a
                                              • Instruction ID: 82543b1294874596aab80aef1d84db47b04d2e718f68f82ae147fd81bd1f0c30
                                              • Opcode Fuzzy Hash: 00b28404818705fe61c484bfcc1e97110dd978cfd2c06e10edb677b914630c5a
                                              • Instruction Fuzzy Hash: 4C1123B6D003099FDB10CFAAD944AEEFBF4EB88720F14842AE419A7210C375A544CFA5
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,CAC8067A), ref: 02D8F3B7
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2872922931.0000000002D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_2d80000_RegAsm.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: aa35bf83e58a49579f683ebad85089f9dad8b23f18a667a68b05f1104b0df3b4
                                              • Instruction ID: 9fa954dcded651dcbf95e7e6ec90da145e285dc30a43968913d6ae777a19692d
                                              • Opcode Fuzzy Hash: aa35bf83e58a49579f683ebad85089f9dad8b23f18a667a68b05f1104b0df3b4
                                              • Instruction Fuzzy Hash: 6D111FB6C006699FCB10DFAAC544BDEFBB4AF48324F15816AD818B7740D378A944CFA5
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0679BFFE
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878138136.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6790000_RegAsm.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: c6e54cef0ecd3df97235c6af0cef0f001f3eabb5f2b7b2cad08001402ba9d5f4
                                              • Instruction ID: 46793afea1e1d3f0cca54bff99e451d1d5a8a606d2ddd5b020101856c7b39aec
                                              • Opcode Fuzzy Hash: c6e54cef0ecd3df97235c6af0cef0f001f3eabb5f2b7b2cad08001402ba9d5f4
                                              • Instruction Fuzzy Hash: FD11E0B6C006498FDB10CF9AD844ADEFBF4AF88724F14842AD459A7210D375A545CFA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH^q
                                              • API String ID: 0-2549759414
                                              • Opcode ID: 2944902fcdc7d64636e6a51718b2dad6fae1fd06822e1eae577ce614f410d7b1
                                              • Instruction ID: 626469c3e675ea7552c33a85c4f1c3a3faf5b7a8e454f3a9e2010efdddf46847
                                              • Opcode Fuzzy Hash: 2944902fcdc7d64636e6a51718b2dad6fae1fd06822e1eae577ce614f410d7b1
                                              • Instruction Fuzzy Hash: 30417C70E003099FDF559F65C9447AEBBBABF85340F104A29E906EB350DB75E846CB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH^q
                                              • API String ID: 0-2549759414
                                              • Opcode ID: c524887bb30de5189f382c16da1b7da3946dcd2f7afafa1a2b9a0eadcc2ee927
                                              • Instruction ID: 0a5b0f62c98852f2d47ec97a974e3dd673abead06402079ee135d4db590f9bc2
                                              • Opcode Fuzzy Hash: c524887bb30de5189f382c16da1b7da3946dcd2f7afafa1a2b9a0eadcc2ee927
                                              • Instruction Fuzzy Hash: 7F417D70E0020A9FDF55DFA5C5547AEBBB6BF85340F104929D506EB340DBB0E946CB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH^q
                                              • API String ID: 0-2549759414
                                              • Opcode ID: befa24daf80e7d5900614f5dcb54e3de49667af9c7548fefe3e76ea6c0261e25
                                              • Instruction ID: 4e59f704d5c5f26d126e34edcb8ec06432b48a5df4daee8a50600b2256db3945
                                              • Opcode Fuzzy Hash: befa24daf80e7d5900614f5dcb54e3de49667af9c7548fefe3e76ea6c0261e25
                                              • Instruction Fuzzy Hash: 6E31FE31B002058FDB55AB74C86466FBBAAEF89204F104968D406DB394DF79ED86CBE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH^q
                                              • API String ID: 0-2549759414
                                              • Opcode ID: 6dbafd67abff96318586c1fea378cfc91e1f38f2a5223d22abc14f29bf315bf1
                                              • Instruction ID: 52c32b9d1ebb6d1f3a0834a58a339ee96239e477286789cbd56c0d96a7ee6c56
                                              • Opcode Fuzzy Hash: 6dbafd67abff96318586c1fea378cfc91e1f38f2a5223d22abc14f29bf315bf1
                                              • Instruction Fuzzy Hash: 1031EF30B002058FCB59AB74D96466FBBABAB88304F204928D406DB394DF75DD86CBE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q
                                              • API String ID: 0-388095546
                                              • Opcode ID: ebd980c54a224b2edbec63f096ce60b787dcd1fd595b17ff575d6c794b511bc4
                                              • Instruction ID: 3f2298781728dc5177cd8f8263369debfa1c928fa58b206ab3d52d3b7e781e27
                                              • Opcode Fuzzy Hash: ebd980c54a224b2edbec63f096ce60b787dcd1fd595b17ff575d6c794b511bc4
                                              • Instruction Fuzzy Hash: 66F058B5E00228CFDB649A55E9426ACB7BDEB4031AF1C8461CA09EB154D731A987CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Ocq
                                              • API String ID: 0-2995510325
                                              • Opcode ID: df18a6c8ef2ef8d9684648fc6a67aab4893e2a3335a2d03b573140e3511e872c
                                              • Instruction ID: 1853421a04441e83c3850d7b3d1ce49e4475baf6be38a78f33170c00645604c3
                                              • Opcode Fuzzy Hash: df18a6c8ef2ef8d9684648fc6a67aab4893e2a3335a2d03b573140e3511e872c
                                              • Instruction Fuzzy Hash: 18F0DA70A2011DDBDB54DF94E8597AEBBB6BF84715F20451AE402A7294CB741D45CBC0
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0cad36ff83c839c85b5776f573917831835e7fefb21059e3a6913deac4813d31
                                              • Instruction ID: c5a0d998a25bbea339e50d76cb48d6d800c7cd629a5dfb37cf57431df3542d3a
                                              • Opcode Fuzzy Hash: 0cad36ff83c839c85b5776f573917831835e7fefb21059e3a6913deac4813d31
                                              • Instruction Fuzzy Hash: 3B329430B402198FDF54DB68D990BAEBBB6FB88314F108529E505EB355DB39EC42CB91
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b4484f15996e550b59e436cf36965783a8758dbab01c7f6ed700737200da2285
                                              • Instruction ID: 78f69c48097428bcc812b196a04db3a5518d0c0444fc8499478470955e815917
                                              • Opcode Fuzzy Hash: b4484f15996e550b59e436cf36965783a8758dbab01c7f6ed700737200da2285
                                              • Instruction Fuzzy Hash: 83B17630F102098FEF64DB6CD5947AE77EAFB89310F248829D509EF395CA25DC868791
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0a63763a31e08c2bcf2957b84f363cb29b1b602c0ff75141c706c4acaaede580
                                              • Instruction ID: cae8114119aacfd236d8edc6326245851a48be98cfd028aaca93e9425261ae23
                                              • Opcode Fuzzy Hash: 0a63763a31e08c2bcf2957b84f363cb29b1b602c0ff75141c706c4acaaede580
                                              • Instruction Fuzzy Hash: 6461E371F001214FCF509A7EC89466FAADBAFC4620B254439D90EDB364EEA5ED4287C2
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d684dc8867d0ad5a66d8a4427517a0d68ee94186e5732a5240e39c32f996106c
                                              • Instruction ID: 8251b85612d9299be419af42f8955f835cabbd620a90a53ddf5590fcd71e9efe
                                              • Opcode Fuzzy Hash: d684dc8867d0ad5a66d8a4427517a0d68ee94186e5732a5240e39c32f996106c
                                              • Instruction Fuzzy Hash: C3913C30E102198FDF60DF68C890B9DB7B1FF89300F208699D549EB295EB70A985CF91
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d822da2d1741ecb814a8e0de86fba97e012591d1118846dceb4cd9866680d94f
                                              • Instruction ID: 8275222dbcbeca775e84e5a9946e284de87c608a890c0e741668547a4e6b6c9d
                                              • Opcode Fuzzy Hash: d822da2d1741ecb814a8e0de86fba97e012591d1118846dceb4cd9866680d94f
                                              • Instruction Fuzzy Hash: 31815F30B002099FDF54DFA9D45476EBBF6AF89304F208429D50AEB394EB75EC868B51
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c9226cff534340d49c2ac664d11b94f277b67c3f80bbaebbd8a5e65e34ff6345
                                              • Instruction ID: f536fb221f10ff208a5078578e42943a9aa62aa2c28a24aea9dd89609c9dcc65
                                              • Opcode Fuzzy Hash: c9226cff534340d49c2ac664d11b94f277b67c3f80bbaebbd8a5e65e34ff6345
                                              • Instruction Fuzzy Hash: 15815E30B002099FDF44DFA9D45476EBBF6AB89304F208429D50ADB394EF75EC868B51
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9f4958724f7776200693d350f4b77c283ea9b53961268a919f3a627eb1078e45
                                              • Instruction ID: d29946127d59ef2db3169347ff61cee28d2100b8db17a95d65bc40930f007d5a
                                              • Opcode Fuzzy Hash: 9f4958724f7776200693d350f4b77c283ea9b53961268a919f3a627eb1078e45
                                              • Instruction Fuzzy Hash: EA913D30E1061A8BDF60DF68C890B9DB7B1FF89304F208599D549EB355EB70AA85CF91
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0cc2d63868842df46f6795b7644a76db17fa7053ade8bacd463708b5f9816cdb
                                              • Instruction ID: 267b94a1f1bc667bd00fd2a77702c8b7342af364d1915a3bf1adbfdfc2a2e186
                                              • Opcode Fuzzy Hash: 0cc2d63868842df46f6795b7644a76db17fa7053ade8bacd463708b5f9816cdb
                                              • Instruction Fuzzy Hash: D6713730A006099FCB54DFA9D994AADBBFAFF84300F248529E409EB355DB30ED46CB51
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6e2097f1c41550a6d277a1cf99bee474e47242e6a1277b7d8c9fc70348202b17
                                              • Instruction ID: 6185e9684001cb3b02132cf74c50c6036cfb6541071ad8fe3698f10d20dbd442
                                              • Opcode Fuzzy Hash: 6e2097f1c41550a6d277a1cf99bee474e47242e6a1277b7d8c9fc70348202b17
                                              • Instruction Fuzzy Hash: D2711930A006099FDB54DFA9D994AAEBBFAFF84300F148529E409EB355DB30ED46CB51
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40ae51eb6bfe8fd2de7d6fbba78454dc5f5c51fb5a602549f2e1b56ccdcf0ab6
                                              • Instruction ID: 5f080213eb93ebea9d7e893b623eaffb2a2af5e5894cf59091a0c1a2d307d623
                                              • Opcode Fuzzy Hash: 40ae51eb6bfe8fd2de7d6fbba78454dc5f5c51fb5a602549f2e1b56ccdcf0ab6
                                              • Instruction Fuzzy Hash: A751CF31E001098FDF14AB78E4446ADBBF6FF89315F208969E20ADB250DF319955CB80
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 199da19655f0b2f22270f11cc487a773fd41b61cb0e89fcdab47f813f2cfd6fb
                                              • Instruction ID: 5e0dde415c009ae5869a7a176b8f5a0cfea77f2586484ac6e96e91e24fa4f089
                                              • Opcode Fuzzy Hash: 199da19655f0b2f22270f11cc487a773fd41b61cb0e89fcdab47f813f2cfd6fb
                                              • Instruction Fuzzy Hash: 40512D30B102188FEF64566CD99077F3A9EDBC9310F20053AE60EDB7D9CA29DC459792
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2cbfa0a2439b44cde683c207e6f385f85bf5e39c820ee2ed7083dc847d29d9f7
                                              • Instruction ID: 3e9afa2a2992623014809f053b1d30b1c1e780897d5d30162e6f45bd5b626c88
                                              • Opcode Fuzzy Hash: 2cbfa0a2439b44cde683c207e6f385f85bf5e39c820ee2ed7083dc847d29d9f7
                                              • Instruction Fuzzy Hash: C251E830B1021C9FEF64666CD99073F369EDBC9310F20093AE60EDB799CA29DC455792
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c3280a8bf43946a25e7e9073123b359876d1dd95b8f4a29317418856a15791f6
                                              • Instruction ID: c266dfcb05c9376884a52131c6c1ec0fb34a54fc4f40c3163db5bc7cf32f78ab
                                              • Opcode Fuzzy Hash: c3280a8bf43946a25e7e9073123b359876d1dd95b8f4a29317418856a15791f6
                                              • Instruction Fuzzy Hash: 7E4141B1E006098FDF70CE99D8C1AAFF7B6FB94310F10492AE256DB650D730E8458B92
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 16f620865d241dc8c8b3461a7287e5f26d41e75d578b139c481cb52afa4f3ef7
                                              • Instruction ID: f4f90e6c72ed5429cea5d92cfddbdbf1e71d3ff436e046a2bb56c4eb263ad1fc
                                              • Opcode Fuzzy Hash: 16f620865d241dc8c8b3461a7287e5f26d41e75d578b139c481cb52afa4f3ef7
                                              • Instruction Fuzzy Hash: 28317E31F102099BCB15CFA4D8946AEFBB6BF89300F14C919E916EB340DB70AD86CB40
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 526184897edeb1d53c447ed0f8372c921a4d95464d0bc70dbb5854476a8907f4
                                              • Instruction ID: 9eb72bb8fba0689ee2c153599bbf149ce76e153ac772599ecaf8e598c7379242
                                              • Opcode Fuzzy Hash: 526184897edeb1d53c447ed0f8372c921a4d95464d0bc70dbb5854476a8907f4
                                              • Instruction Fuzzy Hash: C9316F31F102099BCB55CFA5D8946AEFBB6BF89300F10C919E916EB340DB71A986CB40
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ea1ee92510c1cc742e155c4e2330b9b14ce027457988b345e1cd9c5263bac29e
                                              • Instruction ID: c28bcc665df20c0096b4c88bf395f458508be916ffd11c79e5ebf8f57c88c599
                                              • Opcode Fuzzy Hash: ea1ee92510c1cc742e155c4e2330b9b14ce027457988b345e1cd9c5263bac29e
                                              • Instruction Fuzzy Hash: 6A219C76E006199FDB40DF78D940AAEBBF5FB88714F1480A9E905EB390E734ED018B91
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a86726b1cfa6633aa3b05ea6992bae91086b26f46e1d988c8f886de1153ac21a
                                              • Instruction ID: 2615224b066379376fcb4677abf5006c328632f5ddaab58aa81d92cacb643640
                                              • Opcode Fuzzy Hash: a86726b1cfa6633aa3b05ea6992bae91086b26f46e1d988c8f886de1153ac21a
                                              • Instruction Fuzzy Hash: 472173B1A007098FCB60CEADC8C15AEFBF6FB94310F104929D15ADB654D730E8498B81
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ada0be70219204f93d0d45411162e7974a72e0277178acb4f9cdf8db95dfc842
                                              • Instruction ID: 51fdc24acc566f4d832726d4e4cdd80e31d28efc78059d9154ab47b5383b29a4
                                              • Opcode Fuzzy Hash: ada0be70219204f93d0d45411162e7974a72e0277178acb4f9cdf8db95dfc842
                                              • Instruction Fuzzy Hash: 70219C71E016199FDB40EF79D840AAEB7F5FB48710F108065EA05EB390E734ED018B90
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2872561999.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_166d000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 060cda504a98124fbfa6bc7e2d19b9167a987aa570db4b968c06dce5656c68fe
                                              • Instruction ID: ca89f686ca6a293b19f9c7491dc8904b7e671c16457519c29bd110c5c4020f1b
                                              • Opcode Fuzzy Hash: 060cda504a98124fbfa6bc7e2d19b9167a987aa570db4b968c06dce5656c68fe
                                              • Instruction Fuzzy Hash: 41213471604240DFCB11DF58DEC0B26BBA9EB84314F24C56DD8894B356C33AD447CA62
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cc382716b3488674429e6a0247ed9f73ec864a468477b5e595740b847f259640
                                              • Instruction ID: a1a7d630b28fee4e1f285f9336ac54ddffcc6f42fd4df24034a2033b879b851d
                                              • Opcode Fuzzy Hash: cc382716b3488674429e6a0247ed9f73ec864a468477b5e595740b847f259640
                                              • Instruction Fuzzy Hash: F321A231B101199FDF44DA69E95069EB7BAEB84314F248539D509EB340EB31ED818B85
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: edd2dfd9af56818444209fab13acae08d3fcc7a9a04aae056421058f92488a0a
                                              • Instruction ID: 0f3b3158a77fdef73caaf98e7facff7c6d99826ba6679432fe065fcb4a6ec343
                                              • Opcode Fuzzy Hash: edd2dfd9af56818444209fab13acae08d3fcc7a9a04aae056421058f92488a0a
                                              • Instruction Fuzzy Hash: D211D071E002189BCB54DB79D8401EEFBBAEB89310F0085AAE00AEB300DE31D981CB91
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5add58d4bc5e4b7d69c083234ae07b1126218c5fcb9bf469a62d78dd83b54cdb
                                              • Instruction ID: 3a8fbc2366776c4b4d0ddb759beb3f5ecf62af8c950f7a6ceb398a9f14470db6
                                              • Opcode Fuzzy Hash: 5add58d4bc5e4b7d69c083234ae07b1126218c5fcb9bf469a62d78dd83b54cdb
                                              • Instruction Fuzzy Hash: EF014536B101188BDF245A38F8953EEB3AAEBC4325F20053AEA09DB745CE359902C7C1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cb07b6ad466462ed20cf11f95d5a0bab9ca8aa291cf0a8614bbf71bcd29cbe7f
                                              • Instruction ID: 2c4a402c0566640ae05baeea95ab9f490e7cb7aa6d9f9615d1029a0c835179c8
                                              • Opcode Fuzzy Hash: cb07b6ad466462ed20cf11f95d5a0bab9ca8aa291cf0a8614bbf71bcd29cbe7f
                                              • Instruction Fuzzy Hash: D111A132B101286FDF549678CC14AAE77EAEBC8654B104039D50AEB344DE74EC068BD1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 11ac5792bd126ca30a9d309971c80d99f51710cece755c211b4da70d208653a5
                                              • Instruction ID: 1a7db60bb9074bc9a2b83c56e4fac74198b5f8a3c12f8059369f776f95cea77a
                                              • Opcode Fuzzy Hash: 11ac5792bd126ca30a9d309971c80d99f51710cece755c211b4da70d208653a5
                                              • Instruction Fuzzy Hash: 13012435B145114FCB61D67CE86073EABEEDBCA710F18847AE10ECB342D9A6CC028395
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4f442884936363a820b21f73581c1c6a80b792d21802187ab3099019bf0d0896
                                              • Instruction ID: 5fcc69d403611a3b14912d97b7a0dd9109cd38fd58e0a9bfc04471ad1c826ddb
                                              • Opcode Fuzzy Hash: 4f442884936363a820b21f73581c1c6a80b792d21802187ab3099019bf0d0896
                                              • Instruction Fuzzy Hash: DA01D475B101114FCF51C57C985973E6BDACBCA624F14882AE50ACB341D925DD038391
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9265ee49517f5a8aace7e8d19974616d03d080fcb6a67e1ff33dacb5695c80a5
                                              • Instruction ID: 4c9670735bbf7643992b4ef185f2199535826d88613638f5f302190d08956e27
                                              • Opcode Fuzzy Hash: 9265ee49517f5a8aace7e8d19974616d03d080fcb6a67e1ff33dacb5695c80a5
                                              • Instruction Fuzzy Hash: 5821E0B5D01259AFCB00CF9AD985ADEFBB4BB49324F10812AE918A7210C374A944CFA5
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2872561999.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_166d000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 17de7163a1e12a4c5df783ee0f29f24f6994aba7d146e6d7d26c00eb2d5c80d5
                                              • Instruction ID: 67279518f71b9865e5f5b1c4b97a5419ca3846eb69a3b172a7d7455e352d56b3
                                              • Opcode Fuzzy Hash: 17de7163a1e12a4c5df783ee0f29f24f6994aba7d146e6d7d26c00eb2d5c80d5
                                              • Instruction Fuzzy Hash: 5211BB75604280CFDB12CF58D9C4B15FFA1FB84318F28C6AAD8894B756C33AD44ACB62
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 26b39330066b5bcc54b38c41d189c7e57d69a35c23eada6fe0592bd0dbab0c19
                                              • Instruction ID: d3d439379a3a2c9e0955cc58397af96dfc9c297379f4c6d8c89c5d38057a98ea
                                              • Opcode Fuzzy Hash: 26b39330066b5bcc54b38c41d189c7e57d69a35c23eada6fe0592bd0dbab0c19
                                              • Instruction Fuzzy Hash: 4F01B175B015104FDBA59678E96572E7BE9EB8A610F10842AE50ADB354ED20EC038391
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4584a3ad0aaa286ba929c5b95236896af2bf93104efcd58f8f58b7a026663237
                                              • Instruction ID: 724670e8fa61c8100004dd89a4d06e441d5ac5169bba3b9aba552afee882a74e
                                              • Opcode Fuzzy Hash: 4584a3ad0aaa286ba929c5b95236896af2bf93104efcd58f8f58b7a026663237
                                              • Instruction Fuzzy Hash: E201F736F100296BDB559678CC147FFB7AE9BC8614F144036C50AEB244EE34DC0687D2
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bb0859430052a78ffa893884376d5591982ef2307a201e357ab261a309100713
                                              • Instruction ID: 49970d54810931150e4c189e885152a844124dda20e852a580a8a0b6ce1a76f0
                                              • Opcode Fuzzy Hash: bb0859430052a78ffa893884376d5591982ef2307a201e357ab261a309100713
                                              • Instruction Fuzzy Hash: E711D3B1D012599FCB00CF9AD884ADEFBB4FB49324F10812AE518B7200C374A954CFA5
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3a4e41750b0d544212f545d94d331a1009de307f8e501b1b51e33f68c505dd34
                                              • Instruction ID: 803f71ad5f8a16465d77a064dc94dc6411e41e35be6fb53b83bf50583231d6f0
                                              • Opcode Fuzzy Hash: 3a4e41750b0d544212f545d94d331a1009de307f8e501b1b51e33f68c505dd34
                                              • Instruction Fuzzy Hash: 3901AD31B104110BDB64966DE85472EB6EECBC9720F108439F60ECB340EEA5DC024395
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1403a40f07f1def0c4e5860bd82b82030f646383c61dc7a8a16bd92a51a5956d
                                              • Instruction ID: fb949919ae9a6b77d912ed380b07f3b406cfcc43471b3f0b3a1dbfd3d5890ce9
                                              • Opcode Fuzzy Hash: 1403a40f07f1def0c4e5860bd82b82030f646383c61dc7a8a16bd92a51a5956d
                                              • Instruction Fuzzy Hash: 6601A431B101155BCB65D57D945873EB7DEDBC9724F14883AEA0ECB340DE21DD024785
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1b095ad791ba1792448f51a2fc8834ec2e3a86f69078aa67790216ab05bfebe4
                                              • Instruction ID: 9a10c4d89af3fd206c01b6b433ea5a9f7318766ec645c19e2966907cdb2a19c3
                                              • Opcode Fuzzy Hash: 1b095ad791ba1792448f51a2fc8834ec2e3a86f69078aa67790216ab05bfebe4
                                              • Instruction Fuzzy Hash: 45016234B105144BDB64966CE85472EB7D9EB8A714F10843AE50ACB344DD21EC038795
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 411d95643217c99fce9c14eb45e307b3d27ba41da2e0d6171cedd2c160f452cc
                                              • Instruction ID: cd93d8fd3add5b8ebdeeb499e47f55480d07162b997f6e92a0bdb9c824de7fb0
                                              • Opcode Fuzzy Hash: 411d95643217c99fce9c14eb45e307b3d27ba41da2e0d6171cedd2c160f452cc
                                              • Instruction Fuzzy Hash: 8201A432F502289BCF54AA6AE8816ADB77AE785754F008539EA01EB344DB35A8048B94
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 41a308ea62ad423305384a139178c2c724e5fc66a4e744fd27a0d84fcf1a1883
                                              • Instruction ID: 7a44a458bc9c627f7bb658512b34e7144fb087426dbd9c0b6a3a41cb76f1f54b
                                              • Opcode Fuzzy Hash: 41a308ea62ad423305384a139178c2c724e5fc66a4e744fd27a0d84fcf1a1883
                                              • Instruction Fuzzy Hash: 75F06576E051859FCF91CA748E053AD3F6CAB02204F2049DAC488CF107F135C985CB41
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e18200f6d720b8296204dae624cf09ddf50557ce2f80f93682828e9826ca6c7f
                                              • Instruction ID: cb46751c7adb7dc818ad35704dce19372ee6a81e950380ed4f409f5df3967abd
                                              • Opcode Fuzzy Hash: e18200f6d720b8296204dae624cf09ddf50557ce2f80f93682828e9826ca6c7f
                                              • Instruction Fuzzy Hash: 04E09A76E1022C9BDF2499A8D80559EBBADE785760F00043BEA1AEB200D971AC058391
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 27fc362adf4e5e3a3f16794ea433264828d66b0af6c2fdbecd420a34b2fbd6aa
                                              • Instruction ID: f30a4ce42df3165a60cf85ace0d53791e498db43b142cfec3c2279ff78916531
                                              • Opcode Fuzzy Hash: 27fc362adf4e5e3a3f16794ea433264828d66b0af6c2fdbecd420a34b2fbd6aa
                                              • Instruction Fuzzy Hash: 36E0C271E10108ABDF50DEB4C90579E77ACEB02304F2088A4D508CF202F172CA828780
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-2222239885
                                              • Opcode ID: fc446f74d86bc87593a2bf641f1568091acb760802d38ebe6967711eac635c37
                                              • Instruction ID: a9411ee07c834b61a1f5a03c5e66137862bbffdcd3caf6f6a0bbc2596719f4e5
                                              • Opcode Fuzzy Hash: fc446f74d86bc87593a2bf641f1568091acb760802d38ebe6967711eac635c37
                                              • Instruction Fuzzy Hash: 64120D30E002198FDB68EF69C954AADB7B6BF84704F2085ADD509EB354DB309D85CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-3823777903
                                              • Opcode ID: cd9b656631921f4c2d9d5990989110467e06d05f64d39a7aa6a452b186f6b877
                                              • Instruction ID: 9199c2cc95932ba0c050a34b18aac2d5efdbbbef1e0d54e615d7448fd6439c94
                                              • Opcode Fuzzy Hash: cd9b656631921f4c2d9d5990989110467e06d05f64d39a7aa6a452b186f6b877
                                              • Instruction Fuzzy Hash: 50915A30A01209DFDB68EB69DA54B6EBBBABF84304F108529D401EB354DB759C85CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-390881366
                                              • Opcode ID: 39607706decb1c210a957d4568168d7dee33380d7f29713b6493e0f6d4f33917
                                              • Instruction ID: d5754dc99cb2807bb64b4d887e735398dc92977985dd294c0c0a81ea35876dbb
                                              • Opcode Fuzzy Hash: 39607706decb1c210a957d4568168d7dee33380d7f29713b6493e0f6d4f33917
                                              • Instruction Fuzzy Hash: 35F13B30A00208CFDB58EF69C594A6EB7B7FF84345F208569D4159B368DB31EC8ACB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q
                                              • API String ID: 0-2125118731
                                              • Opcode ID: 2c8368f3676aed10e306f13f8eafef78119518c3fe239d422df14336a5ea3dcf
                                              • Instruction ID: b7b2fbbe6104890df729b33ab9ae3da34be680d497fca3f21da1b2f6ac2abade
                                              • Opcode Fuzzy Hash: 2c8368f3676aed10e306f13f8eafef78119518c3fe239d422df14336a5ea3dcf
                                              • Instruction Fuzzy Hash: CFB14970E00208CFDB64EB68D9956AEB7B6FF88301F248969D406DB354DB74DC86CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q
                                              • API String ID: 0-2125118731
                                              • Opcode ID: 68eb4dd7d9faf6398281745f6298b45971df81066c07f09674109e4e735a66cf
                                              • Instruction ID: 9574547e5961e5e105b57c229aa05fb7bfc59ef0e13418fd2fd976ddcb6dc2a7
                                              • Opcode Fuzzy Hash: 68eb4dd7d9faf6398281745f6298b45971df81066c07f09674109e4e735a66cf
                                              • Instruction Fuzzy Hash: 3851A270E112088FDF69DB68D980AAEB7BAEF84311F108529D916DF354DB31DC45CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.2878593387.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6810000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LR^q$LR^q$$^q$$^q
                                              • API String ID: 0-2454687669
                                              • Opcode ID: 51fe8b6c317b15d618ad3106a130d15933f831ecb724a5531a1f7e6b8ee8ee3e
                                              • Instruction ID: 5ee097d2bca335cc7b30544d567c6954f9e28c96061a22296f971953a6e7b3f6
                                              • Opcode Fuzzy Hash: 51fe8b6c317b15d618ad3106a130d15933f831ecb724a5531a1f7e6b8ee8ee3e
                                              • Instruction Fuzzy Hash: 5551A270B002058FDB54EB28D951A6EB7EAFF89704F108569D506DF3A4DB30EC45CB91