Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
doc_rfq Oferta KH 09281.pdf.com.exe

Overview

General Information

Sample name:doc_rfq Oferta KH 09281.pdf.com.exe
Analysis ID:1507753
MD5:0994bce735fc8bb848d1431edf6338da
SHA1:6862b41edee8d724004e9ada90d21289c3d45bef
SHA256:6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7
Tags:exe
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Quasar RAT
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • doc_rfq Oferta KH 09281.pdf.com.exe (PID: 6800 cmdline: "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe" MD5: 0994BCE735FC8BB848D1431EDF6338DA)
    • doc_rfq Oferta KH 09281.pdf.com.exe (PID: 5404 cmdline: "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe" MD5: 0994BCE735FC8BB848D1431EDF6338DA)
      • schtasks.exe (PID: 732 cmdline: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 1396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • workbook.exe (PID: 4960 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: 0994BCE735FC8BB848D1431EDF6338DA)
        • workbook.exe (PID: 600 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: 0994BCE735FC8BB848D1431EDF6338DA)
          • schtasks.exe (PID: 6412 cmdline: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 6768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • workbook.exe (PID: 5960 cmdline: C:\Users\user\AppData\Roaming\SubDir\workbook.exe MD5: 0994BCE735FC8BB848D1431EDF6338DA)
    • workbook.exe (PID: 6796 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: 0994BCE735FC8BB848D1431EDF6338DA)
    • workbook.exe (PID: 7160 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: 0994BCE735FC8BB848D1431EDF6338DA)
    • workbook.exe (PID: 1836 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: 0994BCE735FC8BB848D1431EDF6338DA)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;", "SubDirectory": "SubDir", "InstallName": "workbook.exe", "MutexName": "0235e291-5d04-4fa3-932c-869aeec51499", "StartupKey": "workbook", "Tag": "Long Leg", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.1733061397.0000000003CE9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000007.00000002.1810220246.00000000045A9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000006.00000002.1724896917.000000000269A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000003.00000002.1695939479.0000000000720000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            0.2.doc_rfq Oferta KH 09281.pdf.com.exe.2e2a74c.1.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
              6.2.workbook.exe.269a704.0.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                    • 0x28ef4d:$x1: Quasar.Common.Messages
                    • 0x29f276:$x1: Quasar.Common.Messages
                    • 0x2ab83a:$x4: Uninstalling... good bye :-(
                    • 0x2ad02f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                    Click to see the 11 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\workbook.exe, ParentProcessId: 600, ParentProcessName: workbook.exe, ProcessCommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, ProcessId: 6412, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe", ParentImage: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe, ParentProcessId: 5404, ParentProcessName: doc_rfq Oferta KH 09281.pdf.com.exe, ProcessCommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, ProcessId: 732, ProcessName: schtasks.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-09T08:54:04.270441+020020355951Domain Observed Used for C2 Detected213.159.74.809792192.168.2.449735TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-09T08:54:04.270441+020020276191Domain Observed Used for C2 Detected213.159.74.809792192.168.2.449735TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;", "SubDirectory": "SubDir", "InstallName": "workbook.exe", "MutexName": "0235e291-5d04-4fa3-932c-869aeec51499", "StartupKey": "workbook", "Tag": "Long Leg", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                    Source: twart.myfirewall.orgVirustotal: Detection: 10%Perma Link
                    Source: twart.myfirewall.orgVirustotal: Detection: 10%Perma Link
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeReversingLabs: Detection: 26%
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeReversingLabs: Detection: 26%
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeVirustotal: Detection: 32%Perma Link
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.2e2a74c.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.workbook.exe.269a704.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.1733061397.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1810220246.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1724896917.000000000269A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1695939479.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1680827727.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1771103939.0000000002F6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 6800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 5404, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 600, type: MEMORYSTR
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeJoe Sandbox ML: detected
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeJoe Sandbox ML: detected
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.4:49737 version: TLS 1.2
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 213.159.74.80:9792 -> 192.168.2.4:49735
                    Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 213.159.74.80:9792 -> 192.168.2.4:49735
                    Source: Malware configuration extractorURLs: twart.myfirewall.org
                    Source: Yara matchFile source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.4:49735 -> 213.159.74.80:9792
                    Source: Joe Sandbox ViewIP Address: 213.159.74.80 213.159.74.80
                    Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                    Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                    Source: Joe Sandbox ViewASN Name: CTINET-ASCTINETAutonomousSystemRU CTINET-ASCTINETAutonomousSystemRU
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: ipwho.is
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: twart.myfirewall.org
                    Source: global trafficDNS traffic detected: DNS query: ipwho.is
                    Source: workbook.exe, 00000008.00000002.4143910729.0000000006575000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
                    Source: workbook.exe, 00000008.00000002.4141849869.0000000005E96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/d8/
                    Source: workbook.exe, 00000008.00000002.4124867943.00000000016E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: workbook.exe, 00000008.00000002.4124867943.00000000016E2000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.8.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: workbook.exe, 00000008.00000002.4141849869.0000000005E96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/y8
                    Source: workbook.exe, 00000008.00000002.4127288420.00000000037F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                    Source: workbook.exe, 00000008.00000002.4127288420.00000000037F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.isd
                    Source: workbook.exe, 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                    Source: workbook.exe, 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/d
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1708803322.0000000003331000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4127288420.00000000035EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688402907.0000000005E74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: workbook.exe, 00000008.00000002.4127288420.00000000037E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4127288420.00000000037E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is/
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4127288420.00000000035F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                    Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.4:49737 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\workbook.exeJump to behavior

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.2e2a74c.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.workbook.exe.269a704.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.1733061397.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1810220246.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1724896917.000000000269A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1695939479.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1680827727.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1771103939.0000000002F6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 6800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 5404, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 600, type: MEMORYSTR

                    System Summary

                    barindex
                    Source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: initial sampleStatic PE information: Filename: doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: initial sampleStatic PE information: Filename: doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_00F6D5BC0_2_00F6D5BC
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_02DC74700_2_02DC7470
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_02DC00400_2_02DC0040
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_02DC00070_2_02DC0007
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_02DC74600_2_02DC7460
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E424A80_2_04E424A8
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E4B4700_2_04E4B470
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E454B00_2_04E454B0
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E424990_2_04E42499
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E450780_2_04E45078
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E45D200_2_04E45D20
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E45D100_2_04E45D10
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E458E80_2_04E458E8
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E458D80_2_04E458D8
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E478680_2_04E47868
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 3_2_0329F03C3_2_0329F03C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_00C0D5BC6_2_00C0D5BC
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B24A86_2_046B24A8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046BB3806_2_046BB380
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B54B06_2_046B54B0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B24996_2_046B2499
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B50786_2_046B5078
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B5D206_2_046B5D20
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B5D1A6_2_046B5D1A
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B78686_2_046B7868
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B58E86_2_046B58E8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04C474706_2_04C47470
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04C400406_2_04C40040
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04C400066_2_04C40006
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04C474636_2_04C47463
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_015ED5BC7_2_015ED5BC
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F724A87_2_04F724A8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F7B4707_2_04F7B470
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F754B07_2_04F754B0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F724997_2_04F72499
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F750787_2_04F75078
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F7505F7_2_04F7505F
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F75D207_2_04F75D20
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F75D1A7_2_04F75D1A
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F758E87_2_04F758E8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F778687_2_04F77868
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_033CF03C8_2_033CF03C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_0858B2C08_2_0858B2C0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08587E488_2_08587E48
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01B5F03C13_2_01B5F03C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_05BE20D013_2_05BE20D0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_05BE906813_2_05BE9068
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_05BE051813_2_05BE0518
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_05BE050813_2_05BE0508
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_05BE9EE013_2_05BE9EE0
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1679006437.0000000000F7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1680827727.0000000002E2A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1680827727.0000000002E2A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1680827727.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688081822.00000000055D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000720000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeBinary or memory string: OriginalFilenameLwaF.exe@ vs doc_rfq Oferta KH 09281.pdf.com.exe
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, workbook.exe.3.drBinary or memory string: *.slnEError processing directory {0} {1}#Deleting file {0}%Modifying file {0}=Unable to Delete file {0}. {1}.tmpWGlobalSection(TeamFoundationVersionControl)!EndGlobalSection
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@22/5@2/2
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\doc_rfq Oferta KH 09281.pdf.com.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMutant created: \Sessions\1\BaseNamedObjects\Local\0235e291-5d04-4fa3-932c-869aeec51499
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1396:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6768:120:WilError_03
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeReversingLabs: Detection: 26%
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeVirustotal: Detection: 32%
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeFile read: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptnet.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cabinet.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic file information: File size 3706880 > 1048576
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x387a00
                    Source: doc_rfq Oferta KH 09281.pdf.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: doc_rfq Oferta KH 09281.pdf.com.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: workbook.exe.3.dr, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_02DCB234 push ebx; iretd 0_2_02DCB256
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_02DCB22F push ebx; iretd 0_2_02DCB233
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeCode function: 0_2_04E4893E pushfd ; iretd 0_2_04E48949
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_046B893E pushfd ; iretd 6_2_046B8949
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_04F7893E pushfd ; iretd 7_2_04F78949
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeFile created: C:\Users\user\AppData\Roaming\SubDir\workbook.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeFile opened: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 6800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4960, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: F60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: 2DE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: 4DE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: 8910000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: 7620000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: 9C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: AC70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: B040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: 3330000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: BD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 2650000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 4650000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 7CE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 8CE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 9210000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A210000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A5B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 15A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 2F10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 4F10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 83B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 93B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 98E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A8E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: AC70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3320000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 35C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3320000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 1B50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 36F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3600000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 5166Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 4429Jump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe TID: 6840Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe TID: 736Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 8Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 6208Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 7128Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 7100Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 736Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: workbook.exe, 00000008.00000002.4143910729.0000000006575000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWxg
                    Source: workbook.exe, 00000008.00000002.4141849869.0000000005EFD000.00000004.00000020.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4143910729.0000000006575000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeMemory written: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\workbook.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\workbook.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe "C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.2e2a74c.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.workbook.exe.269a704.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.1733061397.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1810220246.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1724896917.000000000269A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1695939479.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1680827727.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1771103939.0000000002F6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 6800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 5404, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 600, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.2e2a74c.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.workbook.exe.269a704.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.doc_rfq Oferta KH 09281.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_rfq Oferta KH 09281.pdf.com.exe.415c738.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.1733061397.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1810220246.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1724896917.000000000269A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1695939479.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1680827727.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1771103939.0000000002F6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 6800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: doc_rfq Oferta KH 09281.pdf.com.exe PID: 5404, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 600, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Windows Management Instrumentation
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Masquerading
                    11
                    Input Capture
                    1
                    Query Registry
                    Remote Services11
                    Input Capture
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    LSASS Memory111
                    Security Software Discovery
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    41
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                    Process Injection
                    NTDS41
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Hidden Files and Directories
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeylogging113
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Network Configuration Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Software Packing
                    DCSync23
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1507753 Sample: doc_rfq Oferta KH 09281.pdf... Startdate: 09/09/2024 Architecture: WINDOWS Score: 100 48 twart.myfirewall.org 2->48 50 ipwho.is 2->50 52 bg.microsoft.map.fastly.net 2->52 60 Multi AV Scanner detection for domain / URL 2->60 62 Suricata IDS alerts for network traffic 2->62 64 Found malware configuration 2->64 66 11 other signatures 2->66 11 doc_rfq Oferta KH 09281.pdf.com.exe 3 2->11         started        15 workbook.exe 2 2->15         started        signatures3 process4 file5 46 doc_rfq Oferta KH 09281.pdf.com.exe.log, ASCII 11->46 dropped 72 Injects a PE file into a foreign processes 11->72 17 doc_rfq Oferta KH 09281.pdf.com.exe 4 11->17         started        21 doc_rfq Oferta KH 09281.pdf.com.exe 11->21         started        23 workbook.exe 2 15->23         started        25 workbook.exe 15->25         started        27 workbook.exe 15->27         started        signatures6 process7 file8 44 C:\Users\user\AppData\...\workbook.exe, PE32 17->44 dropped 58 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->58 29 workbook.exe 3 17->29         started        32 schtasks.exe 1 17->32         started        signatures9 process10 signatures11 74 Multi AV Scanner detection for dropped file 29->74 76 Machine Learning detection for dropped file 29->76 78 Injects a PE file into a foreign processes 29->78 34 workbook.exe 15 2 29->34         started        38 conhost.exe 32->38         started        process12 dnsIp13 54 twart.myfirewall.org 213.159.74.80, 49735, 9792 CTINET-ASCTINETAutonomousSystemRU Russian Federation 34->54 56 ipwho.is 195.201.57.90, 443, 49737 HETZNER-ASDE Germany 34->56 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 34->68 70 Installs a global keyboard hook 34->70 40 schtasks.exe 1 34->40         started        signatures14 process15 process16 42 conhost.exe 40->42         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    doc_rfq Oferta KH 09281.pdf.com.exe26%ReversingLabsWin32.Trojan.Generic
                    doc_rfq Oferta KH 09281.pdf.com.exe100%Joe Sandbox ML
                    doc_rfq Oferta KH 09281.pdf.com.exe33%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\SubDir\workbook.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\SubDir\workbook.exe26%ReversingLabsWin32.Trojan.Generic
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    bg.microsoft.map.fastly.net0%VirustotalBrowse
                    ipwho.is0%VirustotalBrowse
                    twart.myfirewall.org10%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%Avira URL Cloudsafe
                    http://www.fontbureau.com/designersG0%Avira URL Cloudsafe
                    http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                    http://www.fontbureau.com0%Avira URL Cloudsafe
                    http://www.fontbureau.com/designers/?0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/14436606/233540%Avira URL Cloudsafe
                    http://www.fontbureau.com/designersG0%VirustotalBrowse
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.fontbureau.com0%VirustotalBrowse
                    http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
                    https://api.ipify.org/0%VirustotalBrowse
                    http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
                    http://schemas.datacontract.org/2004/07/0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
                    http://www.fontbureau.com/designers/?0%VirustotalBrowse
                    https://stackoverflow.com/q/14436606/233540%VirustotalBrowse
                    http://schemas.datacontract.org/2004/07/0%VirustotalBrowse
                    http://www.fontbureau.com/designers?0%Avira URL Cloudsafe
                    http://ipwho.isd0%Avira URL Cloudsafe
                    twart.myfirewall.org0%Avira URL Cloudsafe
                    http://www.fontbureau.com/designers0%Avira URL Cloudsafe
                    http://www.tiro.com0%Avira URL Cloudsafe
                    http://www.fontbureau.com/designers?0%VirustotalBrowse
                    http://www.goodfont.co.kr0%Avira URL Cloudsafe
                    http://crl.microsoft.0%Avira URL Cloudsafe
                    http://www.carterandcone.coml0%Avira URL Cloudsafe
                    http://www.sajatypeworks.com0%Avira URL Cloudsafe
                    http://www.fontbureau.com/designers0%VirustotalBrowse
                    http://www.typography.netD0%Avira URL Cloudsafe
                    http://www.tiro.com0%VirustotalBrowse
                    http://www.goodfont.co.kr0%VirustotalBrowse
                    http://crl.microsoft.0%VirustotalBrowse
                    http://schemas.datacontract.org/2004/07/d0%Avira URL Cloudsafe
                    http://www.fontbureau.com/designers/cabarga.htmlN0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
                    twart.myfirewall.org10%VirustotalBrowse
                    http://www.sajatypeworks.com0%VirustotalBrowse
                    http://www.galapagosdesign.com/staff/dennis.htm0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn0%Avira URL Cloudsafe
                    http://schemas.datacontract.org/2004/07/d0%VirustotalBrowse
                    http://www.fontbureau.com/designers/frere-user.html0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/11564914/23354;0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
                    http://www.jiyu-kobo.co.jp/0%Avira URL Cloudsafe
                    http://www.fontbureau.com/designers/cabarga.htmlN0%VirustotalBrowse
                    http://www.founder.com.cn/cn0%VirustotalBrowse
                    https://ipwho.is0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/11564914/23354;0%VirustotalBrowse
                    http://www.galapagosdesign.com/DPlease0%Avira URL Cloudsafe
                    http://www.fontbureau.com/designers80%Avira URL Cloudsafe
                    http://www.fontbureau.com/designers/frere-user.html0%VirustotalBrowse
                    http://www.fonts.com0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/0%VirustotalBrowse
                    http://www.sandoll.co.kr0%Avira URL Cloudsafe
                    https://ipwho.is0%VirustotalBrowse
                    http://www.fontbureau.com/designers80%VirustotalBrowse
                    http://www.galapagosdesign.com/DPlease0%VirustotalBrowse
                    http://www.urwpp.deDPlease0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/2152978/23354sCannot0%Avira URL Cloudsafe
                    https://ipwho.is/0%Avira URL Cloudsafe
                    http://www.sandoll.co.kr0%VirustotalBrowse
                    http://www.galapagosdesign.com/staff/dennis.htm0%VirustotalBrowse
                    http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
                    http://www.fonts.com0%VirustotalBrowse
                    http://www.sakkal.com0%Avira URL Cloudsafe
                    http://ipwho.is0%Avira URL Cloudsafe
                    https://ipwho.is/0%VirustotalBrowse
                    https://stackoverflow.com/q/2152978/23354sCannot0%VirustotalBrowse
                    http://www.zhongyicts.com.cn0%VirustotalBrowse
                    http://www.sakkal.com0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.210.172
                    truefalseunknown
                    ipwho.is
                    195.201.57.90
                    truefalseunknown
                    twart.myfirewall.org
                    213.159.74.80
                    truetrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    twart.myfirewall.orgtrue
                    • 10%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ipwho.is/false
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designersGdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/?doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackoverflow.com/q/14436606/23354doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4127288420.00000000035F2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cn/bThedoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.datacontract.org/2004/07/workbook.exe, 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers?doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ipwho.isdworkbook.exe, 00000008.00000002.4127288420.00000000037F4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designersdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.goodfont.co.krdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.microsoft.workbook.exe, 00000008.00000002.4143910729.0000000006575000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.comldoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.comdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.typography.netDdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.datacontract.org/2004/07/dworkbook.exe, 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cn/cThedoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cndoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-user.htmldoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackoverflow.com/q/11564914/23354;doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ipwho.isworkbook.exe, 00000008.00000002.4127288420.00000000037E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/DPleasedoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers8doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fonts.comdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sandoll.co.krdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deDPleasedoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackoverflow.com/q/2152978/23354sCannotdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.zhongyicts.com.cndoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namedoc_rfq Oferta KH 09281.pdf.com.exe, 00000003.00000002.1708803322.0000000003331000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4127288420.00000000035EB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sakkal.comdoc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688443419.0000000006F42000.00000004.00000800.00020000.00000000.sdmp, doc_rfq Oferta KH 09281.pdf.com.exe, 00000000.00000002.1688402907.0000000005E74000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ipwho.isworkbook.exe, 00000008.00000002.4127288420.00000000037F4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    213.159.74.80
                    twart.myfirewall.orgRussian Federation
                    13078CTINET-ASCTINETAutonomousSystemRUtrue
                    195.201.57.90
                    ipwho.isGermany
                    24940HETZNER-ASDEfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1507753
                    Start date and time:2024-09-09 08:53:05 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 10m 15s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:18
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:doc_rfq Oferta KH 09281.pdf.com.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@22/5@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 198
                    • Number of non-executed functions: 11
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 199.232.210.172
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    02:53:54API Interceptor1x Sleep call for process: doc_rfq Oferta KH 09281.pdf.com.exe modified
                    02:53:58API Interceptor11275202x Sleep call for process: workbook.exe modified
                    07:53:58Task SchedulerRun new task: workbook path: C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    213.159.74.80Client.exeGet hashmaliciousQuasarBrowse
                      rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                        rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                          ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                            Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                              4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                195.201.57.90SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                                • /?output=json
                                765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                • /?output=json
                                765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                • /?output=json
                                WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                                • /?output=json
                                ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                                • ipwhois.app/xml/
                                cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                • /?output=json
                                Clipper.exeGet hashmaliciousUnknownBrowse
                                • /?output=json
                                cOQD62FceM.exeGet hashmaliciousLuca StealerBrowse
                                • /?output=json
                                Cryptor.exeGet hashmaliciousLuca StealerBrowse
                                • /?output=json
                                Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                • /?output=json
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                ipwho.isbin homebots io.batGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                yJrZoOsgfl.exeGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                IMKssbDprn.exeGet hashmaliciousUnknownBrowse
                                • 108.181.98.179
                                WBmC56ADQF.lnkGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                uScqjqUS1m.exeGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                CVSIyqGKKK.exeGet hashmaliciousUnknownBrowse
                                • 108.181.98.179
                                Client.exeGet hashmaliciousQuasarBrowse
                                • 195.201.57.90
                                AdjustLoader.exeGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                • 195.201.57.90
                                rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                • 108.181.98.179
                                bg.microsoft.map.fastly.netpko_trans_details_20240909_105339#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                • 199.232.214.172
                                https://go.skimresources.com/?id=129857X1600501&url=https://www.freelancer.com/users/login-quick.php?token=30b3628412ea618dcc3f414b266ae263302b3e1b43e6d2d885225319dabe8e68&url=https://secure.adnxs.com/seg?redir=https://link.sbstck.com/redirect/c16392c5-3f33-44df-b0b3-21de244d07c1?j=eyJ1IjoiNGRnZ2x2In0.IkG1h6SLHR3lrFyuSAoQTcZBzKZHtH4uVLaC9IQ4Uu8Get hashmaliciousHTMLPhisherBrowse
                                • 199.232.214.172
                                Quotation-Invitation28252-09yzak_1_cdcon.pdfGet hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                http://onlinesecuritycheck.weebly.com/Get hashmaliciousUnknownBrowse
                                • 199.232.214.172
                                http://rakften.click/Get hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                http://rdr-centru.blogspot.nl/Get hashmaliciousHTMLPhisherBrowse
                                • 199.232.214.172
                                https://seoservicesiox.firebaseapp.com/0.08157749367335065%22%7DGet hashmaliciousHTMLPhisherBrowse
                                • 199.232.210.172
                                http://abhishekch20.github.io/netflix-cloneGet hashmaliciousHTMLPhisherBrowse
                                • 199.232.210.172
                                http://kjkesd.godaddysites.com/Get hashmaliciousUnknownBrowse
                                • 199.232.214.172
                                http://pub-d32e1723091e4c74b19f3caea6a4ed0a.r2.dev/qiye-revised/index.htmlGet hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                twart.myfirewall.orgClient.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                • 213.159.74.80
                                doc_RFQ NEW ORDER #2400228341.pdf.exeGet hashmaliciousAsyncRATBrowse
                                • 41.151.251.119
                                doc_Rfq_TNTM #U00daj rend TM00002916620 exp_pdf.exeGet hashmaliciousXWormBrowse
                                • 103.35.191.158
                                6KfY269eO6.exeGet hashmaliciousLodaRATBrowse
                                • 103.35.191.158
                                #U00daj megrendel#U00e9s - 00905173088 CPTL #U00e1raj#U00e1nlat - egyenk#U00e9nt 100.exeGet hashmaliciousMailPassView, XpertRATBrowse
                                • 103.35.191.158
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                HETZNER-ASDEQuotation.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 135.181.160.46
                                uD9I18eLZ6.exeGet hashmaliciousPureLog Stealer, Raccoon Stealer v2, RedLine, zgRATBrowse
                                • 116.203.232.114
                                http://pratikg7028.github.io/Task4Get hashmaliciousHTMLPhisherBrowse
                                • 78.46.22.25
                                IDMan.exeGet hashmaliciousFredy StealerBrowse
                                • 5.161.243.5
                                IDMan.exeGet hashmaliciousFredy StealerBrowse
                                • 5.161.243.5
                                FZ6oyLoqGM.exeGet hashmaliciousUnknownBrowse
                                • 159.69.88.171
                                bin homebots io.batGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                yJrZoOsgfl.exeGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                WBmC56ADQF.lnkGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                uScqjqUS1m.exeGet hashmaliciousUnknownBrowse
                                • 195.201.57.90
                                CTINET-ASCTINETAutonomousSystemRUClient.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                • 213.159.74.80
                                4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                • 213.159.74.80
                                yEL4yMV0s4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                • 213.159.64.146
                                AGREEMENT AND APPROVAL REPORT FECRWY RN & FR OF 2024-501144_6.5.24.pdfGet hashmaliciousHTMLPhisherBrowse
                                • 213.159.64.109
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                3b5074b1b5d032e5620f69f9f700ff0eQuotation.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 195.201.57.90
                                pko_trans_details_20240909_105339#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                • 195.201.57.90
                                SKT ____202409_____6__.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                • 195.201.57.90
                                filz.exeGet hashmaliciousFormBookBrowse
                                • 195.201.57.90
                                waybill_original_invoice_bl_packinglist_shipment_09_09_2024_0000000000000000000000000000_pdf.batGet hashmaliciousRemcos, GuLoaderBrowse
                                • 195.201.57.90
                                SecuriteInfo.com.Trojan.Packed2.47861.5875.12260.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 195.201.57.90
                                rfqlastquaterproductpurchaseorderimportlist09.batGet hashmaliciousGuLoader, RemcosBrowse
                                • 195.201.57.90
                                Report Of Special Working Allowance (Eng) Aug 2024_xls.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 195.201.57.90
                                Zaplata_06092024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 195.201.57.90
                                MV XINHONG PARTICULARS.pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 195.201.57.90
                                No context
                                Process:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                Category:dropped
                                Size (bytes):71954
                                Entropy (8bit):7.996617769952133
                                Encrypted:true
                                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                Process:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):328
                                Entropy (8bit):3.233401259015598
                                Encrypted:false
                                SSDEEP:6:kKv2L9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:H7DImsLNkPlE99SNxAhUe/3
                                MD5:94CC5A6A995B73E00098B040539CD899
                                SHA1:C2F9A729E596B0D4F463101B1EC8481ABAE64DC4
                                SHA-256:E3F0EA6FB63E71A8E091924B7A8913365693DD008715437CDA956F8607AA4123
                                SHA-512:E5648F96CEB0A3D02EFFC3BC0C7F7DA2B6727FA839C469DAACDBF49D55D41DD399B3B06004C02FFBB14F9A1419821A87644D6A77F4BDFD99380EA5F39967DF80
                                Malicious:false
                                Reputation:low
                                Preview:p...... ........$%.m....(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                Process:C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.34331486778365
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                Process:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.34331486778365
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                Malicious:false
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                Process:C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3706880
                                Entropy (8bit):7.991618423681647
                                Encrypted:true
                                SSDEEP:98304:JrDJO6ifOJhQGiwCa98Grb6PFMPhQCMmgu1gGHO1P:HOzfOJhBLCaHrk8rbfH6P
                                MD5:0994BCE735FC8BB848D1431EDF6338DA
                                SHA1:6862B41EDEE8D724004E9ADA90D21289C3D45BEF
                                SHA-256:6230049ACA6CF64DB37BE7C35946481041629C4F40311F5A39BA45303BD992E7
                                SHA-512:D6D85070BF3DA5DCFF34444C5E5DFB5FB38826852A71FFACDD988E016F620CF01ACD1C7282A6D6615150D966D01C9BE1C2477148A22D61DC18C8AFFB264E00AB
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 26%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....S.f..............0..z8.........Z.8.. ....8...@.. ........................8...........@...................................8.O.....8.......................8...................................................... ............... ..H............text...`x8.. ...z8................. ..`.rsrc.........8......|8.............@..@.reloc........8.......8.............@..B................<.8.....H.......x?..X6......L....u..8"8............................................}.......}.......}.....(.......(.....*.0..+.........,..{.......+....,...{....o........(.....*V..s....}......(.....*....0............(....s....}.....(....s....}.....#........#........s+...s)...}.....s....}.....s....}.....s....}.....(................#........( .....#......$@( ...(......r...p...#.......?( .....#.......@( ...(......r...p...#.......@( .....#.......@( ...(......r...p...#.......@( .....#......
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.991618423681647
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:doc_rfq Oferta KH 09281.pdf.com.exe
                                File size:3'706'880 bytes
                                MD5:0994bce735fc8bb848d1431edf6338da
                                SHA1:6862b41edee8d724004e9ada90d21289c3d45bef
                                SHA256:6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7
                                SHA512:d6d85070bf3da5dcff34444c5e5dfb5fb38826852a71ffacdd988e016f620cf01acd1c7282a6d6615150d966d01c9be1c2477148a22d61dc18c8affb264e00ab
                                SSDEEP:98304:JrDJO6ifOJhQGiwCa98Grb6PFMPhQCMmgu1gGHO1P:HOzfOJhBLCaHrk8rbfH6P
                                TLSH:980633D59B29E12AC749133E4931E1379E355E6EF006A30EC7CEFCD7398B2563A58848
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....S.f..............0..z8.........Z.8.. ....8...@.. ........................8...........@................................
                                Icon Hash:4c9f33415113864d
                                Entrypoint:0x78985a
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x66DE5316 [Mon Sep 9 01:44:54 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3898080x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x38a0000x10f8.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x38c0000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x3878600x387a004c37bdb0378ef42675d059ddfb905d63unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x38a0000x10f80x1200ad76c0419b443ad6414b4e417aa5b04cFalse0.7788628472222222data6.813404574685928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x38c0000xc0x2009259fa573e8be89dee32890977ea1ac9False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x38a0c80xc92PNG image data, 224 x 224, 8-bit/color RGBA, non-interlaced0.9608452454940957
                                RT_GROUP_ICON0x38ad6c0x14data1.15
                                RT_VERSION0x38ad900x364data0.4412442396313364
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-09-09T08:54:04.270441+02002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)1213.159.74.809792192.168.2.449735TCP
                                2024-09-09T08:54:04.270441+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert1213.159.74.809792192.168.2.449735TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 9, 2024 08:54:03.375933886 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:03.380857944 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:03.380934954 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:03.386662006 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:03.391515970 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:04.257688999 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:04.257709026 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:04.257826090 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:04.265639067 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:04.270441055 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:04.615153074 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:04.713011026 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:05.576601028 CEST49737443192.168.2.4195.201.57.90
                                Sep 9, 2024 08:54:05.576647043 CEST44349737195.201.57.90192.168.2.4
                                Sep 9, 2024 08:54:05.576716900 CEST49737443192.168.2.4195.201.57.90
                                Sep 9, 2024 08:54:05.578449965 CEST49737443192.168.2.4195.201.57.90
                                Sep 9, 2024 08:54:05.578465939 CEST44349737195.201.57.90192.168.2.4
                                Sep 9, 2024 08:54:06.445775032 CEST44349737195.201.57.90192.168.2.4
                                Sep 9, 2024 08:54:06.445857048 CEST49737443192.168.2.4195.201.57.90
                                Sep 9, 2024 08:54:06.450097084 CEST49737443192.168.2.4195.201.57.90
                                Sep 9, 2024 08:54:06.450110912 CEST44349737195.201.57.90192.168.2.4
                                Sep 9, 2024 08:54:06.450359106 CEST44349737195.201.57.90192.168.2.4
                                Sep 9, 2024 08:54:06.455606937 CEST49737443192.168.2.4195.201.57.90
                                Sep 9, 2024 08:54:06.500499010 CEST44349737195.201.57.90192.168.2.4
                                Sep 9, 2024 08:54:06.652107000 CEST44349737195.201.57.90192.168.2.4
                                Sep 9, 2024 08:54:06.652198076 CEST44349737195.201.57.90192.168.2.4
                                Sep 9, 2024 08:54:06.652543068 CEST49737443192.168.2.4195.201.57.90
                                Sep 9, 2024 08:54:06.760364056 CEST49737443192.168.2.4195.201.57.90
                                Sep 9, 2024 08:54:06.964142084 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:06.969228029 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:06.969296932 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:06.974375963 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:07.095206022 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:07.182090998 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:07.182194948 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:32.197448015 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:32.202363014 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:54:57.213125944 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:54:57.219733000 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:55:22.228847027 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:55:22.234184980 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:55:47.244429111 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:55:47.249363899 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:56:12.260073900 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:56:12.265010118 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:56:37.275751114 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:56:37.281558037 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:57:02.287677050 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:57:02.292618990 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:57:27.307085037 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:57:27.312212944 CEST979249735213.159.74.80192.168.2.4
                                Sep 9, 2024 08:57:52.322737932 CEST497359792192.168.2.4213.159.74.80
                                Sep 9, 2024 08:57:52.327620029 CEST979249735213.159.74.80192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 9, 2024 08:54:03.350178003 CEST6366553192.168.2.41.1.1.1
                                Sep 9, 2024 08:54:03.362927914 CEST53636651.1.1.1192.168.2.4
                                Sep 9, 2024 08:54:05.566492081 CEST5967153192.168.2.41.1.1.1
                                Sep 9, 2024 08:54:05.573278904 CEST53596711.1.1.1192.168.2.4
                                Sep 9, 2024 08:54:14.892574072 CEST53613991.1.1.1192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Sep 9, 2024 08:54:03.350178003 CEST192.168.2.41.1.1.10x12faStandard query (0)twart.myfirewall.orgA (IP address)IN (0x0001)false
                                Sep 9, 2024 08:54:05.566492081 CEST192.168.2.41.1.1.10x3a11Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Sep 9, 2024 08:54:03.362927914 CEST1.1.1.1192.168.2.40x12faNo error (0)twart.myfirewall.org213.159.74.80A (IP address)IN (0x0001)false
                                Sep 9, 2024 08:54:04.721565008 CEST1.1.1.1192.168.2.40x1b9bNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                Sep 9, 2024 08:54:04.721565008 CEST1.1.1.1192.168.2.40x1b9bNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                Sep 9, 2024 08:54:05.573278904 CEST1.1.1.1192.168.2.40x3a11No error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                                • ipwho.is
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.449737195.201.57.90443600C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                TimestampBytes transferredDirectionData
                                2024-09-09 06:54:06 UTC150OUTGET / HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                Host: ipwho.is
                                Connection: Keep-Alive
                                2024-09-09 06:54:06 UTC223INHTTP/1.1 200 OK
                                Date: Mon, 09 Sep 2024 06:54:06 GMT
                                Content-Type: application/json; charset=utf-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Server: ipwhois
                                Access-Control-Allow-Headers: *
                                X-Robots-Tag: noindex
                                2024-09-09 06:54:06 UTC1019INData Raw: 33 65 66 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72
                                Data Ascii: 3ef{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.33", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yor


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:02:53:53
                                Start date:09/09/2024
                                Path:C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"
                                Imagebase:0x6a0000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.1680827727.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.1692611454.0000000008911000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.1681979802.0000000003DE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:02:53:55
                                Start date:09/09/2024
                                Path:C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"
                                Imagebase:0x2b0000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:02:53:55
                                Start date:09/09/2024
                                Path:C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\doc_rfq Oferta KH 09281.pdf.com.exe"
                                Imagebase:0xbf0000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.1695939479.0000000000720000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.1695939479.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:4
                                Start time:02:53:57
                                Start date:09/09/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:"schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                                Imagebase:0x5a0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:02:53:57
                                Start date:09/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:02:53:57
                                Start date:09/09/2024
                                Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                Imagebase:0x40000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000002.1733061397.0000000003CE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000002.1724896917.000000000269A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 26%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:7
                                Start time:02:53:58
                                Start date:09/09/2024
                                Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                Imagebase:0x7ff7699e0000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.1810220246.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.1771103939.0000000002F6A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:8
                                Start time:02:53:59
                                Start date:09/09/2024
                                Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                Imagebase:0xe90000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000008.00000002.4127288420.0000000003841000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:9
                                Start time:02:54:01
                                Start date:09/09/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:"schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                                Imagebase:0x5a0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:10
                                Start time:02:54:01
                                Start date:09/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:11
                                Start time:02:54:04
                                Start date:09/09/2024
                                Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                Imagebase:0x330000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:12
                                Start time:02:54:04
                                Start date:09/09/2024
                                Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                Imagebase:0x250000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:13
                                Start time:02:54:04
                                Start date:09/09/2024
                                Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                Imagebase:0xf90000
                                File size:3'706'880 bytes
                                MD5 hash:0994BCE735FC8BB848D1431EDF6338DA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:10.1%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:299
                                  Total number of Limit Nodes:8
                                  execution_graph 39012 4e48b95 39013 4e48b25 39012->39013 39017 4e49426 39012->39017 39023 4e493b0 39012->39023 39028 4e493c0 39012->39028 39018 4e493b4 39017->39018 39020 4e49429 39017->39020 39033 4e496f8 39018->39033 39051 4e496e9 39018->39051 39019 4e493e2 39019->39013 39020->39013 39024 4e493b5 39023->39024 39026 4e496f8 12 API calls 39024->39026 39027 4e496e9 12 API calls 39024->39027 39025 4e493e2 39025->39013 39026->39025 39027->39025 39029 4e493da 39028->39029 39031 4e496f8 12 API calls 39029->39031 39032 4e496e9 12 API calls 39029->39032 39030 4e493e2 39030->39013 39031->39030 39032->39030 39034 4e4970d 39033->39034 39046 4e4971f 39034->39046 39069 4e4a1ed 39034->39069 39074 4e49c2c 39034->39074 39079 4e49a63 39034->39079 39084 4e49b81 39034->39084 39088 4e49ca6 39034->39088 39096 4e49964 39034->39096 39104 4e49dfb 39034->39104 39109 4e49cbb 39034->39109 39113 4e49e38 39034->39113 39121 4e49a58 39034->39121 39126 4e4993c 39034->39126 39134 4e498b6 39034->39134 39142 4e499ab 39034->39142 39147 4e4984f 39034->39147 39151 4e4a14e 39034->39151 39046->39019 39052 4e496ec 39051->39052 39053 4e49964 4 API calls 39052->39053 39054 4e49ca6 4 API calls 39052->39054 39055 4e49b81 2 API calls 39052->39055 39056 4e49a63 2 API calls 39052->39056 39057 4e49c2c 2 API calls 39052->39057 39058 4e4a1ed 2 API calls 39052->39058 39059 4e4a14e 4 API calls 39052->39059 39060 4e4984f 2 API calls 39052->39060 39061 4e499ab 2 API calls 39052->39061 39062 4e498b6 4 API calls 39052->39062 39063 4e4971f 39052->39063 39064 4e4993c 4 API calls 39052->39064 39065 4e49a58 2 API calls 39052->39065 39066 4e49e38 4 API calls 39052->39066 39067 4e49cbb 2 API calls 39052->39067 39068 4e49dfb 2 API calls 39052->39068 39053->39063 39054->39063 39055->39063 39056->39063 39057->39063 39058->39063 39059->39063 39060->39063 39061->39063 39062->39063 39063->39019 39064->39063 39065->39063 39066->39063 39067->39063 39068->39063 39070 4e4a208 39069->39070 39159 4e477b0 39070->39159 39163 4e477b8 39070->39163 39071 4e4a21d 39075 4e49c35 39074->39075 39167 4e47e30 39075->39167 39171 4e47e38 39075->39171 39076 4e49da9 39076->39046 39080 4e49a70 39079->39080 39082 4e47e30 WriteProcessMemory 39080->39082 39083 4e47e38 WriteProcessMemory 39080->39083 39081 4e4a0d6 39082->39081 39083->39081 39175 4e47d70 39084->39175 39179 4e47d78 39084->39179 39085 4e49b9f 39089 4e498d9 39088->39089 39090 4e49e12 39089->39090 39183 4e47ca0 39089->39183 39187 4e47c99 39089->39187 39092 4e477b0 ResumeThread 39090->39092 39093 4e477b8 ResumeThread 39090->39093 39091 4e4a21d 39092->39091 39093->39091 39097 4e49940 39096->39097 39098 4e49e12 39097->39098 39100 4e47ca0 Wow64SetThreadContext 39097->39100 39101 4e47c99 Wow64SetThreadContext 39097->39101 39102 4e477b0 ResumeThread 39098->39102 39103 4e477b8 ResumeThread 39098->39103 39099 4e4a21d 39100->39097 39101->39097 39102->39099 39103->39099 39105 4e49e01 39104->39105 39107 4e477b0 ResumeThread 39105->39107 39108 4e477b8 ResumeThread 39105->39108 39106 4e4a21d 39107->39106 39108->39106 39111 4e47ca0 Wow64SetThreadContext 39109->39111 39112 4e47c99 Wow64SetThreadContext 39109->39112 39110 4e49cd5 39111->39110 39112->39110 39114 4e49940 39113->39114 39115 4e49e12 39114->39115 39119 4e47ca0 Wow64SetThreadContext 39114->39119 39120 4e47c99 Wow64SetThreadContext 39114->39120 39117 4e477b0 ResumeThread 39115->39117 39118 4e477b8 ResumeThread 39115->39118 39116 4e4a21d 39117->39116 39118->39116 39119->39114 39120->39114 39122 4e49f6d 39121->39122 39191 4e47f20 39122->39191 39195 4e47f28 39122->39195 39123 4e49f10 39123->39046 39127 4e49940 39126->39127 39128 4e49e12 39127->39128 39132 4e47ca0 Wow64SetThreadContext 39127->39132 39133 4e47c99 Wow64SetThreadContext 39127->39133 39130 4e477b0 ResumeThread 39128->39130 39131 4e477b8 ResumeThread 39128->39131 39129 4e4a21d 39130->39129 39131->39129 39132->39127 39133->39127 39135 4e498d9 39134->39135 39136 4e49e12 39135->39136 39138 4e47ca0 Wow64SetThreadContext 39135->39138 39139 4e47c99 Wow64SetThreadContext 39135->39139 39140 4e477b0 ResumeThread 39136->39140 39141 4e477b8 ResumeThread 39136->39141 39137 4e4a21d 39138->39135 39139->39135 39140->39137 39141->39137 39143 4e499ce 39142->39143 39145 4e47e30 WriteProcessMemory 39143->39145 39146 4e47e38 WriteProcessMemory 39143->39146 39144 4e49963 39145->39144 39146->39144 39199 4e484b4 39147->39199 39203 4e484c0 39147->39203 39152 4e49940 39151->39152 39153 4e49e12 39152->39153 39157 4e47ca0 Wow64SetThreadContext 39152->39157 39158 4e47c99 Wow64SetThreadContext 39152->39158 39155 4e477b0 ResumeThread 39153->39155 39156 4e477b8 ResumeThread 39153->39156 39154 4e4a21d 39155->39154 39156->39154 39157->39152 39158->39152 39160 4e477b4 ResumeThread 39159->39160 39162 4e47829 39160->39162 39162->39071 39164 4e477f8 ResumeThread 39163->39164 39166 4e47829 39164->39166 39166->39071 39168 4e47e34 WriteProcessMemory 39167->39168 39170 4e47ed7 39168->39170 39170->39076 39172 4e47e3c WriteProcessMemory 39171->39172 39174 4e47ed7 39172->39174 39174->39076 39176 4e47d74 VirtualAllocEx 39175->39176 39178 4e47df5 39176->39178 39178->39085 39180 4e47d7c VirtualAllocEx 39179->39180 39182 4e47df5 39180->39182 39182->39085 39184 4e47ca4 Wow64SetThreadContext 39183->39184 39186 4e47d2d 39184->39186 39186->39089 39188 4e47c9c Wow64SetThreadContext 39187->39188 39190 4e47d2d 39188->39190 39190->39089 39192 4e47f24 ReadProcessMemory 39191->39192 39194 4e47fb7 39192->39194 39194->39123 39196 4e47f73 ReadProcessMemory 39195->39196 39198 4e47fb7 39196->39198 39198->39123 39200 4e484bc CreateProcessA 39199->39200 39202 4e4870b 39200->39202 39204 4e484c4 CreateProcessA 39203->39204 39206 4e4870b 39204->39206 38835 f6acb0 38839 f6ad97 38835->38839 38847 f6ada8 38835->38847 38836 f6acbf 38840 f6adb9 38839->38840 38841 f6addc 38839->38841 38840->38841 38855 f6b040 38840->38855 38859 f6b031 38840->38859 38841->38836 38842 f6add4 38842->38841 38843 f6afe0 GetModuleHandleW 38842->38843 38844 f6b00d 38843->38844 38844->38836 38848 f6adb9 38847->38848 38849 f6addc 38847->38849 38848->38849 38853 f6b040 LoadLibraryExW 38848->38853 38854 f6b031 2 API calls 38848->38854 38849->38836 38850 f6add4 38850->38849 38851 f6afe0 GetModuleHandleW 38850->38851 38852 f6b00d 38851->38852 38852->38836 38853->38850 38854->38850 38856 f6b054 38855->38856 38857 f6b079 38856->38857 38866 f6a130 38856->38866 38857->38842 38860 f6b03a 38859->38860 38861 f6afd9 GetModuleHandleW 38859->38861 38864 f6b079 38860->38864 38865 f6a130 LoadLibraryExW 38860->38865 38863 f6b00d 38861->38863 38863->38842 38864->38842 38865->38864 38867 f6b220 LoadLibraryExW 38866->38867 38869 f6b299 38867->38869 38869->38857 38948 f6d690 DuplicateHandle 38949 f6d726 38948->38949 39207 f6d040 39208 f6d086 GetCurrentProcess 39207->39208 39210 f6d0d8 GetCurrentThread 39208->39210 39214 f6d0d1 39208->39214 39211 f6d115 GetCurrentProcess 39210->39211 39212 f6d10e 39210->39212 39213 f6d14b 39211->39213 39212->39211 39215 f6d173 GetCurrentThreadId 39213->39215 39214->39210 39216 f6d1a4 39215->39216 38950 4e4a708 38951 4e4a72e 38950->38951 38952 4e4a893 38950->38952 38951->38952 38954 4e480b0 38951->38954 38955 4e4a988 PostMessageW 38954->38955 38956 4e4a9f4 38955->38956 38956->38951 38957 f1d01c 38958 f1d034 38957->38958 38959 f1d08e 38958->38959 38964 2dc1a98 38958->38964 38969 2dc2809 38958->38969 38974 2dc2818 38958->38974 38979 2dc1aa8 38958->38979 38965 2dc1aa8 38964->38965 38967 2dc2818 2 API calls 38965->38967 38968 2dc2809 2 API calls 38965->38968 38966 2dc1aef 38966->38959 38967->38966 38968->38966 38970 2dc2845 38969->38970 38971 2dc2877 38970->38971 38984 2dc2990 38970->38984 38989 2dc29a0 38970->38989 38975 2dc2845 38974->38975 38976 2dc2877 38975->38976 38977 2dc2990 2 API calls 38975->38977 38978 2dc29a0 2 API calls 38975->38978 38977->38976 38978->38976 38980 2dc1ace 38979->38980 38982 2dc2818 2 API calls 38980->38982 38983 2dc2809 2 API calls 38980->38983 38981 2dc1aef 38981->38959 38982->38981 38983->38981 38986 2dc29a0 38984->38986 38985 2dc2a40 38985->38971 38994 2dc2a58 38986->38994 38997 2dc2a48 38986->38997 38991 2dc29b4 38989->38991 38990 2dc2a40 38990->38971 38992 2dc2a58 2 API calls 38991->38992 38993 2dc2a48 2 API calls 38991->38993 38992->38990 38993->38990 38996 2dc2a69 38994->38996 39000 2dc401e 38994->39000 38996->38985 38998 2dc401e 2 API calls 38997->38998 38999 2dc2a69 38997->38999 38998->38999 38999->38985 39004 2dc4040 39000->39004 39008 2dc4030 39000->39008 39001 2dc402a 39001->38996 39005 2dc4082 39004->39005 39007 2dc4089 39004->39007 39006 2dc40da CallWindowProcW 39005->39006 39005->39007 39006->39007 39007->39001 39009 2dc4040 39008->39009 39010 2dc40da CallWindowProcW 39009->39010 39011 2dc4089 39009->39011 39010->39011 39011->39001 38870 f64668 38871 f6467a 38870->38871 38872 f64686 38871->38872 38876 f64779 38871->38876 38881 f63e40 38872->38881 38874 f646a5 38877 f6479d 38876->38877 38885 f64879 38877->38885 38889 f64888 38877->38889 38882 f63e4b 38881->38882 38897 f65c4c 38882->38897 38884 f67053 38884->38874 38887 f64888 38885->38887 38886 f6498c 38886->38886 38887->38886 38893 f644c4 38887->38893 38891 f648af 38889->38891 38890 f6498c 38890->38890 38891->38890 38892 f644c4 CreateActCtxA 38891->38892 38892->38890 38894 f65918 CreateActCtxA 38893->38894 38896 f659db 38894->38896 38898 f65c57 38897->38898 38901 f65c6c 38898->38901 38900 f670fd 38900->38884 38902 f65c77 38901->38902 38905 f65c9c 38902->38905 38904 f671da 38904->38900 38906 f65ca7 38905->38906 38909 f65ccc 38906->38909 38908 f672cd 38908->38904 38910 f65cd7 38909->38910 38911 f68609 38910->38911 38913 f6cd77 38910->38913 38911->38908 38914 f6cd99 38913->38914 38915 f6cdbd 38914->38915 38918 f6cf27 38914->38918 38922 f6cf28 38914->38922 38915->38911 38920 f6cf35 38918->38920 38919 f6cf6f 38919->38915 38920->38919 38926 f6bae0 38920->38926 38923 f6cf35 38922->38923 38924 f6cf6f 38923->38924 38925 f6bae0 2 API calls 38923->38925 38924->38915 38925->38924 38927 f6bae5 38926->38927 38929 f6dc88 38927->38929 38930 f6d2dc 38927->38930 38929->38929 38931 f6d2e7 38930->38931 38932 f65ccc 2 API calls 38931->38932 38933 f6dcf7 38932->38933 38937 f6fa88 38933->38937 38943 f6fa70 38933->38943 38934 f6dd31 38934->38929 38939 f6fab9 38937->38939 38940 f6fbb9 38937->38940 38938 f6fac5 38938->38934 38939->38938 38941 2dc09c0 CreateWindowExW CreateWindowExW 38939->38941 38942 2dc09b0 CreateWindowExW CreateWindowExW 38939->38942 38940->38934 38941->38940 38942->38940 38944 f6fa4c 38943->38944 38944->38943 38945 f6fac5 38944->38945 38946 2dc09c0 CreateWindowExW CreateWindowExW 38944->38946 38947 2dc09b0 CreateWindowExW CreateWindowExW 38944->38947 38945->38934 38946->38945 38947->38945

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 427 2dc7470-2dc749b 428 2dc749d 427->428 429 2dc74a2-2dc779c call 2dc71fc * 2 call 2dc720c call 2dc721c call 2dc722c call 2dc723c * 2 call 2dc724c * 2 call 2dc725c * 2 427->429 428->429 483 2dc7966-2dc798f call 2dc728c 429->483 486 2dc7995-2dc7ce6 call 2dc729c call 2dc725c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc72ec call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc 483->486 487 2dc77a1-2dc77a8 483->487 553 2dc7ced-2dc7d4c 486->553 554 2dc7ce8 486->554 488 2dc7933-2dc795c call 2dc727c 487->488 493 2dc77ad-2dc77d7 call 2dc726c 488->493 494 2dc7962-2dc7965 488->494 500 2dc77e0-2dc788c 493->500 494->483 517 2dc788e-2dc78a5 500->517 518 2dc78a7-2dc78e4 500->518 523 2dc7921-2dc7932 517->523 524 2dc78e6-2dc791f 518->524 525 2dc7920 518->525 523->488 524->525 525->523 557 2dc7d4e-2dc7da4 553->557 558 2dc7daa-2dc7e81 call 2dc72fc 553->558 554->553 557->558 570 2dc7e8c-2dc8dd9 call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc730c call 2dc731c call 2dc732c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc730c call 2dc731c call 2dc733c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc733c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc732c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc732c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc730c call 2dc734c call 2dc732c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc735c call 2dc736c call 2dc737c call 2dc738c * 12 558->570 766 2dc8ddb-2dc8de7 570->766 767 2dc8e03 570->767 768 2dc8de9-2dc8def 766->768 769 2dc8df1-2dc8df7 766->769 770 2dc8e09-2dc8ec3 call 2dc739c call 2dc73ac call 2dc72bc call 2dc73bc 767->770 771 2dc8e01 768->771 769->771 771->770
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1680792868.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2dc0000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Ppkq
                                  • API String ID: 0-531843880
                                  • Opcode ID: 5cdd3de59b65f7dc6c6ab8a306d4b9cf4b0595533b5af8553500177cc0e12fb3
                                  • Instruction ID: bbe6ef3160117042ae6b80b5214bc2b2ea7fb86e1dd5eac718dbf8d7df310ce9
                                  • Opcode Fuzzy Hash: 5cdd3de59b65f7dc6c6ab8a306d4b9cf4b0595533b5af8553500177cc0e12fb3
                                  • Instruction Fuzzy Hash: 12F2C834A4121ACFDB24EF64C998AD9B7B2FF89300F1041E9D409AB365DB31AE85CF50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 878 2dc7460-2dc749b 880 2dc749d 878->880 881 2dc74a2-2dc7506 878->881 880->881 886 2dc7510-2dc751c call 2dc71fc 881->886 888 2dc7521-2dc7600 call 2dc71fc call 2dc720c call 2dc721c call 2dc722c 886->888 906 2dc760a-2dc7616 call 2dc723c 888->906 908 2dc761b-2dc7664 call 2dc723c 906->908 914 2dc766e-2dc767a call 2dc724c 908->914 916 2dc767f-2dc76c8 call 2dc724c 914->916 922 2dc76d2-2dc76de call 2dc725c 916->922 924 2dc76e3-2dc7710 call 2dc725c 922->924 928 2dc7715-2dc772c 924->928 930 2dc7732-2dc779c 928->930 935 2dc7966-2dc798f call 2dc728c 930->935 938 2dc7995-2dc7a18 call 2dc729c call 2dc725c 935->938 939 2dc77a1-2dc77a8 935->939 960 2dc7a1e-2dc7a32 938->960 940 2dc7933-2dc795c call 2dc727c 939->940 945 2dc77ad-2dc77bf call 2dc726c 940->945 946 2dc7962-2dc7965 940->946 950 2dc77c4-2dc77d7 945->950 946->935 952 2dc77e0-2dc788c 950->952 969 2dc788e-2dc78a5 952->969 970 2dc78a7-2dc78e4 952->970 962 2dc7a38-2dc7b3b call 2dc72ac call 2dc72bc 960->962 982 2dc7b45-2dc7b5f call 2dc72cc 962->982 975 2dc7921-2dc7932 969->975 976 2dc78e6-2dc791f 970->976 977 2dc7920 970->977 975->940 976->977 977->975 985 2dc7b64-2dc7ca4 call 2dc72dc call 2dc72ec call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc 982->985 1002 2dc7cab-2dc7cd0 985->1002 1004 2dc7cd6-2dc7ce6 1002->1004 1005 2dc7ced-2dc7d4c 1004->1005 1006 2dc7ce8 1004->1006 1009 2dc7d4e-2dc7da4 1005->1009 1010 2dc7daa-2dc7db0 1005->1010 1006->1005 1009->1010 1011 2dc7dbc-2dc7dc2 1010->1011 1014 2dc7dcd-2dc7e58 call 2dc72fc 1011->1014 1021 2dc7e63-2dc7e81 1014->1021 1022 2dc7e8c-2dc8dd9 call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc730c call 2dc731c call 2dc732c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc730c call 2dc731c call 2dc733c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc733c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc732c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc732c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc730c call 2dc734c call 2dc732c call 2dc72ac call 2dc72bc call 2dc72cc call 2dc72dc call 2dc735c call 2dc736c call 2dc737c call 2dc738c * 12 1021->1022 1218 2dc8ddb-2dc8de7 1022->1218 1219 2dc8e03 1022->1219 1220 2dc8de9-2dc8def 1218->1220 1221 2dc8df1-2dc8df7 1218->1221 1222 2dc8e09-2dc8ec3 call 2dc739c call 2dc73ac call 2dc72bc call 2dc73bc 1219->1222 1223 2dc8e01 1220->1223 1221->1223 1223->1222
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1680792868.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2dc0000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Ppkq
                                  • API String ID: 0-531843880
                                  • Opcode ID: fe2cbe0959e57a77a0c8244b6edb17562d5289128334130316792c6725f10daa
                                  • Instruction ID: c9fa09f4c44b9e5d1cb0419903e22273e29c46ec40dfb03411d141b8c7da81e8
                                  • Opcode Fuzzy Hash: fe2cbe0959e57a77a0c8244b6edb17562d5289128334130316792c6725f10daa
                                  • Instruction Fuzzy Hash: 9AE2C834A4121ACFDB24EF64C998A99B7F6FF89300F1141E9E4096B365DB31AE85CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 215698e3e03add10ed3a38c85d35c5e890182004cdbf8098c5793b621f218a75
                                  • Instruction ID: f6a679322c44304ca034700fd114270ecc526947c6cd840529426249abb48748
                                  • Opcode Fuzzy Hash: 215698e3e03add10ed3a38c85d35c5e890182004cdbf8098c5793b621f218a75
                                  • Instruction Fuzzy Hash: B6E1BC71B016049FEB29DB76D850BAEB7FAAFC9304F14446DE145AB291DB38F801CB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94e6c00fbbabcb7b34a4b3dfe54cf548bd135650202b54df249c410d0acf3912
                                  • Instruction ID: 4be182d5064e6e1cf2268e26676cb7e84e7b80ab5820e47f12dc6b5506307593
                                  • Opcode Fuzzy Hash: 94e6c00fbbabcb7b34a4b3dfe54cf548bd135650202b54df249c410d0acf3912
                                  • Instruction Fuzzy Hash: BA21B9B1D056188BEB18CF97D8453DEBBF2AFC8300F14D16AD508A6255DB7409468F50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b72783250c801181df80ffe1a08eb7f6e1d079619fcb9eceb1a7ea868bb51b3a
                                  • Instruction ID: d2f821f84ba5f3e7a5af299e35f21b7b33bd06665fd5a74de4d579145b544e3a
                                  • Opcode Fuzzy Hash: b72783250c801181df80ffe1a08eb7f6e1d079619fcb9eceb1a7ea868bb51b3a
                                  • Instruction Fuzzy Hash: 1F21E7B0E046188BEB18CF9BD8443DEFBF7AFC8300F14D06AE50866264EB7419458F90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 294 f6d031-f6d0cf GetCurrentProcess 299 f6d0d1-f6d0d7 294->299 300 f6d0d8-f6d10c GetCurrentThread 294->300 299->300 301 f6d115-f6d149 GetCurrentProcess 300->301 302 f6d10e-f6d114 300->302 303 f6d152-f6d16d call f6d618 301->303 304 f6d14b-f6d151 301->304 302->301 308 f6d173-f6d1a2 GetCurrentThreadId 303->308 304->303 309 f6d1a4-f6d1aa 308->309 310 f6d1ab-f6d20d 308->310 309->310
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 00F6D0BE
                                  • GetCurrentThread.KERNEL32 ref: 00F6D0FB
                                  • GetCurrentProcess.KERNEL32 ref: 00F6D138
                                  • GetCurrentThreadId.KERNEL32 ref: 00F6D191
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: ddabb1fbf6d152ab9eb1bd80ac8e38e6e81a4a9f9f569b5b7ad9b1e71eeba297
                                  • Instruction ID: 27693461ea1907b4e096564312dde7bdec73c6489564f27011636a9fe0475f79
                                  • Opcode Fuzzy Hash: ddabb1fbf6d152ab9eb1bd80ac8e38e6e81a4a9f9f569b5b7ad9b1e71eeba297
                                  • Instruction Fuzzy Hash: BD5156B0E002498FDB14DFA9D948B9EBBF1AF88314F20C459E409A73A1D7759D84CF65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 317 f6d040-f6d0cf GetCurrentProcess 321 f6d0d1-f6d0d7 317->321 322 f6d0d8-f6d10c GetCurrentThread 317->322 321->322 323 f6d115-f6d149 GetCurrentProcess 322->323 324 f6d10e-f6d114 322->324 325 f6d152-f6d16d call f6d618 323->325 326 f6d14b-f6d151 323->326 324->323 330 f6d173-f6d1a2 GetCurrentThreadId 325->330 326->325 331 f6d1a4-f6d1aa 330->331 332 f6d1ab-f6d20d 330->332 331->332
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 00F6D0BE
                                  • GetCurrentThread.KERNEL32 ref: 00F6D0FB
                                  • GetCurrentProcess.KERNEL32 ref: 00F6D138
                                  • GetCurrentThreadId.KERNEL32 ref: 00F6D191
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 067f59585c4e4469147dbe01e22f364e2715f7a82e0920ff219bcfd1deb8a4f9
                                  • Instruction ID: 346304bdaec8a07d030deb28cf93dc603ad3eb64c0176788579255871dc7fcc6
                                  • Opcode Fuzzy Hash: 067f59585c4e4469147dbe01e22f364e2715f7a82e0920ff219bcfd1deb8a4f9
                                  • Instruction Fuzzy Hash: 1E5155B0E002098FDB14DFA9D548BDEBBF1AF88314F20C459E419A7361D7759984CF65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1235 4e484b4-4e484ba 1236 4e484c0-4e484c3 1235->1236 1237 4e484bc-4e484be 1235->1237 1238 4e484c4-4e48555 1236->1238 1237->1236 1237->1238 1240 4e48557-4e48561 1238->1240 1241 4e4858e-4e485ae 1238->1241 1240->1241 1242 4e48563-4e48565 1240->1242 1246 4e485e7-4e48616 1241->1246 1247 4e485b0-4e485ba 1241->1247 1244 4e48567-4e48571 1242->1244 1245 4e48588-4e4858b 1242->1245 1248 4e48575-4e48584 1244->1248 1249 4e48573 1244->1249 1245->1241 1255 4e4864f-4e48709 CreateProcessA 1246->1255 1256 4e48618-4e48622 1246->1256 1247->1246 1251 4e485bc-4e485be 1247->1251 1248->1248 1250 4e48586 1248->1250 1249->1248 1250->1245 1252 4e485c0-4e485ca 1251->1252 1253 4e485e1-4e485e4 1251->1253 1257 4e485cc 1252->1257 1258 4e485ce-4e485dd 1252->1258 1253->1246 1269 4e48712-4e48798 1255->1269 1270 4e4870b-4e48711 1255->1270 1256->1255 1259 4e48624-4e48626 1256->1259 1257->1258 1258->1258 1260 4e485df 1258->1260 1261 4e48628-4e48632 1259->1261 1262 4e48649-4e4864c 1259->1262 1260->1253 1264 4e48634 1261->1264 1265 4e48636-4e48645 1261->1265 1262->1255 1264->1265 1265->1265 1266 4e48647 1265->1266 1266->1262 1280 4e487a8-4e487ac 1269->1280 1281 4e4879a-4e4879e 1269->1281 1270->1269 1283 4e487bc-4e487c0 1280->1283 1284 4e487ae-4e487b2 1280->1284 1281->1280 1282 4e487a0 1281->1282 1282->1280 1286 4e487d0-4e487d4 1283->1286 1287 4e487c2-4e487c6 1283->1287 1284->1283 1285 4e487b4 1284->1285 1285->1283 1289 4e487e6-4e487ed 1286->1289 1290 4e487d6-4e487dc 1286->1290 1287->1286 1288 4e487c8 1287->1288 1288->1286 1291 4e48804 1289->1291 1292 4e487ef-4e487fe 1289->1292 1290->1289 1294 4e48805 1291->1294 1292->1291 1294->1294
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04E486F6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 4d94c05022b69f0ece562a26b58f780ed7973c983abf16ce02d7f70460024dc4
                                  • Instruction ID: d9350eeeb0a7ab0601f1f8572580adb8d7fb15513a745920ade954cf77d51d03
                                  • Opcode Fuzzy Hash: 4d94c05022b69f0ece562a26b58f780ed7973c983abf16ce02d7f70460024dc4
                                  • Instruction Fuzzy Hash: 3FA17B75D002199FEB10DFA9D8407EDBBB2FF88314F1485A9E808A7290DB74A985CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1295 4e484c0-4e48555 1298 4e48557-4e48561 1295->1298 1299 4e4858e-4e485ae 1295->1299 1298->1299 1300 4e48563-4e48565 1298->1300 1304 4e485e7-4e48616 1299->1304 1305 4e485b0-4e485ba 1299->1305 1302 4e48567-4e48571 1300->1302 1303 4e48588-4e4858b 1300->1303 1306 4e48575-4e48584 1302->1306 1307 4e48573 1302->1307 1303->1299 1313 4e4864f-4e48709 CreateProcessA 1304->1313 1314 4e48618-4e48622 1304->1314 1305->1304 1309 4e485bc-4e485be 1305->1309 1306->1306 1308 4e48586 1306->1308 1307->1306 1308->1303 1310 4e485c0-4e485ca 1309->1310 1311 4e485e1-4e485e4 1309->1311 1315 4e485cc 1310->1315 1316 4e485ce-4e485dd 1310->1316 1311->1304 1327 4e48712-4e48798 1313->1327 1328 4e4870b-4e48711 1313->1328 1314->1313 1317 4e48624-4e48626 1314->1317 1315->1316 1316->1316 1318 4e485df 1316->1318 1319 4e48628-4e48632 1317->1319 1320 4e48649-4e4864c 1317->1320 1318->1311 1322 4e48634 1319->1322 1323 4e48636-4e48645 1319->1323 1320->1313 1322->1323 1323->1323 1324 4e48647 1323->1324 1324->1320 1338 4e487a8-4e487ac 1327->1338 1339 4e4879a-4e4879e 1327->1339 1328->1327 1341 4e487bc-4e487c0 1338->1341 1342 4e487ae-4e487b2 1338->1342 1339->1338 1340 4e487a0 1339->1340 1340->1338 1344 4e487d0-4e487d4 1341->1344 1345 4e487c2-4e487c6 1341->1345 1342->1341 1343 4e487b4 1342->1343 1343->1341 1347 4e487e6-4e487ed 1344->1347 1348 4e487d6-4e487dc 1344->1348 1345->1344 1346 4e487c8 1345->1346 1346->1344 1349 4e48804 1347->1349 1350 4e487ef-4e487fe 1347->1350 1348->1347 1352 4e48805 1349->1352 1350->1349 1352->1352
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04E486F6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: ce7c4340f639fc98248a4df933385bf2b64069cf3ed3aeb8f0cf733c0a72d339
                                  • Instruction ID: bc85a6793ffcd3031844caaa326a99e569b9a1b3f4a9d1cd2fb680270eb2d1f5
                                  • Opcode Fuzzy Hash: ce7c4340f639fc98248a4df933385bf2b64069cf3ed3aeb8f0cf733c0a72d339
                                  • Instruction Fuzzy Hash: B1917A75D00219DFEF20DFA9D8407EDBBB2BF88314F0485A9E808A7250DB74A985CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1353 f6ada8-f6adb7 1354 f6ade3-f6ade7 1353->1354 1355 f6adb9-f6adc6 call f6a0cc 1353->1355 1357 f6adfb-f6ae3c 1354->1357 1358 f6ade9-f6adf3 1354->1358 1360 f6addc 1355->1360 1361 f6adc8 1355->1361 1364 f6ae3e-f6ae46 1357->1364 1365 f6ae49-f6ae57 1357->1365 1358->1357 1360->1354 1411 f6adce call f6b040 1361->1411 1412 f6adce call f6b031 1361->1412 1364->1365 1366 f6ae7b-f6ae7d 1365->1366 1367 f6ae59-f6ae5e 1365->1367 1372 f6ae80-f6ae87 1366->1372 1369 f6ae60-f6ae67 call f6a0d8 1367->1369 1370 f6ae69 1367->1370 1368 f6add4-f6add6 1368->1360 1371 f6af18-f6af94 1368->1371 1374 f6ae6b-f6ae79 1369->1374 1370->1374 1403 f6af96-f6afbe 1371->1403 1404 f6afc0-f6afd8 1371->1404 1375 f6ae94-f6ae9b 1372->1375 1376 f6ae89-f6ae91 1372->1376 1374->1372 1378 f6ae9d-f6aea5 1375->1378 1379 f6aea8-f6aeaa call f6a0e8 1375->1379 1376->1375 1378->1379 1383 f6aeaf-f6aeb1 1379->1383 1384 f6aeb3-f6aebb 1383->1384 1385 f6aebe-f6aec3 1383->1385 1384->1385 1386 f6aec5-f6aecc 1385->1386 1387 f6aee1-f6aeee 1385->1387 1386->1387 1389 f6aece-f6aede call f6a0f8 call f6a108 1386->1389 1394 f6aef0-f6af0e 1387->1394 1395 f6af11-f6af17 1387->1395 1389->1387 1394->1395 1403->1404 1406 f6afe0-f6b00b GetModuleHandleW 1404->1406 1407 f6afda-f6afdd 1404->1407 1408 f6b014-f6b028 1406->1408 1409 f6b00d-f6b013 1406->1409 1407->1406 1409->1408 1411->1368 1412->1368
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00F6AFFE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: c696ce6b6aefd757d448f7a87a73dbbacc7f68991946b4aa08dd45f398716dd4
                                  • Instruction ID: 9e8367e228583a1bacbc7caf2a03ff385d3a2269f3705f0934c70e841259cc91
                                  • Opcode Fuzzy Hash: c696ce6b6aefd757d448f7a87a73dbbacc7f68991946b4aa08dd45f398716dd4
                                  • Instruction Fuzzy Hash: 6D8135B0A00B059FD724DF2AC44179ABBF5BF88314F008A2DD096ABA51D775E849DF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1413 2dc18e4-2dc1956 1415 2dc1958-2dc195e 1413->1415 1416 2dc1961-2dc1968 1413->1416 1415->1416 1417 2dc196a-2dc1970 1416->1417 1418 2dc1973-2dc1a12 CreateWindowExW 1416->1418 1417->1418 1420 2dc1a1b-2dc1a53 1418->1420 1421 2dc1a14-2dc1a1a 1418->1421 1425 2dc1a55-2dc1a58 1420->1425 1426 2dc1a60 1420->1426 1421->1420 1425->1426 1427 2dc1a61 1426->1427 1427->1427
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02DC1A02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1680792868.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2dc0000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: abd5be2acbff7b54b8e1c905ceeff52b7811c7173b72287fd893e2a8857e8e22
                                  • Instruction ID: 5362b1f5e25d910a89530d2c3b99766a5fface3ab40765d5cc82b2520f01c88d
                                  • Opcode Fuzzy Hash: abd5be2acbff7b54b8e1c905ceeff52b7811c7173b72287fd893e2a8857e8e22
                                  • Instruction Fuzzy Hash: CA51E0B1D003199FDB14CF99C984ADEBFB5BF48310F24822AE819AB261D7719985CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1428 2dc18f0-2dc1956 1429 2dc1958-2dc195e 1428->1429 1430 2dc1961-2dc1968 1428->1430 1429->1430 1431 2dc196a-2dc1970 1430->1431 1432 2dc1973-2dc1a12 CreateWindowExW 1430->1432 1431->1432 1434 2dc1a1b-2dc1a53 1432->1434 1435 2dc1a14-2dc1a1a 1432->1435 1439 2dc1a55-2dc1a58 1434->1439 1440 2dc1a60 1434->1440 1435->1434 1439->1440 1441 2dc1a61 1440->1441 1441->1441
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02DC1A02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1680792868.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2dc0000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 77cf24a2e593be6cf2d169097975258d2f779e7d58f756776890d7596bc3aba3
                                  • Instruction ID: a3606f67eb1c46e26eeeeaa311bdd832e81964b67b74558a7df306ff6af48dd7
                                  • Opcode Fuzzy Hash: 77cf24a2e593be6cf2d169097975258d2f779e7d58f756776890d7596bc3aba3
                                  • Instruction Fuzzy Hash: 8D41C0B1D003199FDB14CF99C984ADEBBF5BF48310F24812AE819AB221D7719985CF90
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00F659C9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: ba78a9fdb219f3a07cc8f21305a2fc2e27fd7085b80ffea55c1126b6631a112c
                                  • Instruction ID: c3d7ff45f81f8b002f61f00d2bffae94ef3719bc2b293e48aeae8c5c2a54bf36
                                  • Opcode Fuzzy Hash: ba78a9fdb219f3a07cc8f21305a2fc2e27fd7085b80ffea55c1126b6631a112c
                                  • Instruction Fuzzy Hash: 7A41F1B0C00619CBDB24DFA9C884BCDBBF6BF49704F24819AD408BB255DB75598ACF90
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00F659C9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 4b7e1e5b1977f65b199cd62f00d675c2c6b11572483f278990dab386e9bac760
                                  • Instruction ID: f72d15c3d2ce4fc57e32f089eee897de7dc54e65f6be8a811c40f83174e7d986
                                  • Opcode Fuzzy Hash: 4b7e1e5b1977f65b199cd62f00d675c2c6b11572483f278990dab386e9bac760
                                  • Instruction Fuzzy Hash: D141D2B0C0061DDBDB24DFA9C88479EBBF6BF48704F24815AD408BB255DB759945CF90
                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 02DC4101
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1680792868.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2dc0000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: aa05f391bb699f332480219387e9483a001060b2139ef37904556b2cd5ff6c41
                                  • Instruction ID: 10db3d0bf42adb7c911b548d6ea6aa3691669fd479adeb983d09f8e32c46d4b4
                                  • Opcode Fuzzy Hash: aa05f391bb699f332480219387e9483a001060b2139ef37904556b2cd5ff6c41
                                  • Instruction Fuzzy Hash: A841E8B5A00305CFDB14CF99C448AAABBF5FB88314F24C499D559AB361D775A841CFA0
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04E47D1E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 24a0ef3ce03a00633390a66002622348576a783c0202d4a6b9b5f5c35b62e3ad
                                  • Instruction ID: 6b8677b6267ff69364c7170b704b7ff1b5127bbe58dedf99016d1d1b5ef93240
                                  • Opcode Fuzzy Hash: 24a0ef3ce03a00633390a66002622348576a783c0202d4a6b9b5f5c35b62e3ad
                                  • Instruction Fuzzy Hash: 73218B719003488FDB10CFAAC4857EEBFF4EF89324F10846AD495A7251D738A545CF94
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04E47EC8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 5102c16a1a3dd0c59ed62d3adc38dd38ca5faff1d901bc8702fb7e6328f7cb4f
                                  • Instruction ID: 0d2c633a977007cc62ffb73af29f6e9bccdbb7b7da97a4419984cf855873dca6
                                  • Opcode Fuzzy Hash: 5102c16a1a3dd0c59ed62d3adc38dd38ca5faff1d901bc8702fb7e6328f7cb4f
                                  • Instruction Fuzzy Hash: FA2137B5900309DFDB10DFA9C885BDEBBF5FF88314F10882AE958A7251D774A944CBA4
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04E47EC8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 6fcd9073af547abd377e69b565e78ee95e86b5374c1c8044d0d2e96132ceb425
                                  • Instruction ID: 2adeabba0f83f669f59588134d5c0ebc819b43160b872e9cda7089607edc2141
                                  • Opcode Fuzzy Hash: 6fcd9073af547abd377e69b565e78ee95e86b5374c1c8044d0d2e96132ceb425
                                  • Instruction Fuzzy Hash: 8A212AB1900359DFDB10DFA9C945BDEBBF5FF48310F108429E558A7250D774A944CBA4
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04E47FA8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: b7c34e9efabaed6dc44f01331df738350091aef019bb996a26c50eb12ab231db
                                  • Instruction ID: db959de51822b7635f2f6d7c7c3fb977c1c172f0372a399fa123143051d46efa
                                  • Opcode Fuzzy Hash: b7c34e9efabaed6dc44f01331df738350091aef019bb996a26c50eb12ab231db
                                  • Instruction Fuzzy Hash: 422139B18003599FDB10DFAAC845BEEFBF5FF88320F10842AE558A7250D775A544CBA4
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F6D717
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 9557acd95ae926f5b39a35ced4fbd88a2e15cbe9357cbc1efcaa80bc8aa67f05
                                  • Instruction ID: 521742e3d7bef07bb07f7761129f709443374b091b4924e00a6520a13fbac2f1
                                  • Opcode Fuzzy Hash: 9557acd95ae926f5b39a35ced4fbd88a2e15cbe9357cbc1efcaa80bc8aa67f05
                                  • Instruction Fuzzy Hash: 6F2103B5D002089FDB10CFAAD984ADEBBF8EB48320F14801AE918A3210C375A940CFA5
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04E47D1E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 77b316a2fcf13e29f7f74159ed77c4fd62b7ac9dcd80e09ae4a31d6de941ad3b
                                  • Instruction ID: 8865c36f1d2d1cef47ae0b1017afefa9e63f0f77c2ffc63b25083fac2359e140
                                  • Opcode Fuzzy Hash: 77b316a2fcf13e29f7f74159ed77c4fd62b7ac9dcd80e09ae4a31d6de941ad3b
                                  • Instruction Fuzzy Hash: A92138B1D003098FDB10DFAAC4857EEBBF4EF88324F14842AD459A7250DB78A945CFA5
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04E47FA8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 195ef2f8bad994febb278db8f44b8aa1fc44d5ef664f82df796679e015a46119
                                  • Instruction ID: 5f221d2d071cc5652eb585c106859cc1c726156342f4b77c33954a0d9e53b4df
                                  • Opcode Fuzzy Hash: 195ef2f8bad994febb278db8f44b8aa1fc44d5ef664f82df796679e015a46119
                                  • Instruction Fuzzy Hash: 9A2128B18003599FDB10DFAAC845AEEFBF5FF88320F108429E558A7250D735A544CBA4
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00F6AFFE
                                    • Part of subcall function 00F6A130: LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F6B079,00000800,00000000,00000000), ref: 00F6B28A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: HandleLibraryLoadModule
                                  • String ID:
                                  • API String ID: 4133054770-0
                                  • Opcode ID: 944ac18a14793286969870f98bda8f801a8cca0b00e5ed48f8718ec59a4dc5bd
                                  • Instruction ID: a2017bb80b7fe45f09887f9a6bae1820acf4fd170b8734d42e004727bc8cb255
                                  • Opcode Fuzzy Hash: 944ac18a14793286969870f98bda8f801a8cca0b00e5ed48f8718ec59a4dc5bd
                                  • Instruction Fuzzy Hash: E811E272A043449FDB10EF6AD800BABBFF9AF86314F0480AAD058E7252C7749845DFA1
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F6D717
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 803eb52296edbda7298e020ad83650b600e3e439dfbe40f280825716d18664f9
                                  • Instruction ID: 181b2bd74ac8401c5b39b757a80170967f2b905d4adcedc6141e288029d46b17
                                  • Opcode Fuzzy Hash: 803eb52296edbda7298e020ad83650b600e3e439dfbe40f280825716d18664f9
                                  • Instruction Fuzzy Hash: 1921E2B5D002489FDB10CFAAD984ADEBFF8EB48320F14801AE918A3350D375A940CFA5
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04E47DE6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 3e1a896fe7e95d2d0b2f8f071974476369d65343255df3c046ccc04b8d99ad5f
                                  • Instruction ID: 087c7618ae778720a823584ef43a1ee5c3b6aeec9e70301d88b8a3c789bcf010
                                  • Opcode Fuzzy Hash: 3e1a896fe7e95d2d0b2f8f071974476369d65343255df3c046ccc04b8d99ad5f
                                  • Instruction Fuzzy Hash: 661189718002089FDB10DFAAC805AEFBFF9EF88324F10842AE519A7250C735A944CFA0
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F6B079,00000800,00000000,00000000), ref: 00F6B28A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 1a5bd915ebb7bade3dea3717b54a453db0aab5863f854ef5c8f588708d4e9bf5
                                  • Instruction ID: 082ed056cd331654d09a354a3b9ea2488743babcc603b49dd2e23689a52779cd
                                  • Opcode Fuzzy Hash: 1a5bd915ebb7bade3dea3717b54a453db0aab5863f854ef5c8f588708d4e9bf5
                                  • Instruction Fuzzy Hash: 8311E4B6D002099FDB10DF9AD444ADEFBF4EB88320F10852AD519A7210C375A945CFA5
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 04E4A9E5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: dac160ca3d1ccc5259df0d4fb5daa5040665d0a5cf9b8591d93cd0c154bad745
                                  • Instruction ID: e795f82a8d1349b8b75d5f5a2111c069cea53240015f63632e7a9cdfe968f30b
                                  • Opcode Fuzzy Hash: dac160ca3d1ccc5259df0d4fb5daa5040665d0a5cf9b8591d93cd0c154bad745
                                  • Instruction Fuzzy Hash: 4E1134B6800248CFDB10DF8AE485BDEFBF8EB98320F10841AE568A7600D375A544CFA1
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F6B079,00000800,00000000,00000000), ref: 00F6B28A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 0ae9de7e90b0d204ef53098455baf2abf42ad309d1439fdcb435bd79e5f3faa5
                                  • Instruction ID: e5c4460af30a2f6622d0207faf5d0079e4f9fc4a419abf69db0f7ea0bc5b662a
                                  • Opcode Fuzzy Hash: 0ae9de7e90b0d204ef53098455baf2abf42ad309d1439fdcb435bd79e5f3faa5
                                  • Instruction Fuzzy Hash: 0B1114B6D002498FDB10DFAAC444ADEFBF4AB49320F14852AD859A7210C375A545CFA5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: c0a3a08f3b0cb3872df633050306c76c55d3ff57d8ff712edcd423e52387a9e1
                                  • Instruction ID: 19874a5679f33f73fbf8deae8fb72a591da4b7c0eeb213b1a24a6546771074fe
                                  • Opcode Fuzzy Hash: c0a3a08f3b0cb3872df633050306c76c55d3ff57d8ff712edcd423e52387a9e1
                                  • Instruction Fuzzy Hash: 411149B1D002588BDB10DFAAD4457DEFBF8EF88324F108829D459A7250C775A544CF94
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04E47DE6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: bde7af80e93d53fd3e5e975eaba56f3d8ea8c6046979a8d110cce180081bd377
                                  • Instruction ID: a0431b0efc52c1062aa617c154023666eee84882cdaa6762c467becb09578fe2
                                  • Opcode Fuzzy Hash: bde7af80e93d53fd3e5e975eaba56f3d8ea8c6046979a8d110cce180081bd377
                                  • Instruction Fuzzy Hash: 311137719002499FDB10DFAAC845BEFBFF9EF88324F10841AE559A7250C775A554CFA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 06573f4634a5a1f3cea090c32493516c0a4fb2c89a1bc672ba1c37cdb5610689
                                  • Instruction ID: 6f2d75082a00879524c184868e04349776709b8de1cd0d5634381a43550a7830
                                  • Opcode Fuzzy Hash: 06573f4634a5a1f3cea090c32493516c0a4fb2c89a1bc672ba1c37cdb5610689
                                  • Instruction Fuzzy Hash: 401128B1D002588BDB10DFAAC44579EFBF9EB88324F248829D459A7250C775A544CF94
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 04E4A9E5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 77de2d846385e9110ff9b7978f4ab41508ebf6b8814ab28b7e0cd2594ed94562
                                  • Instruction ID: de529318a4281d3ad868f8ed99ab6660047997689da1eaf36eb93cc1365ea0cb
                                  • Opcode Fuzzy Hash: 77de2d846385e9110ff9b7978f4ab41508ebf6b8814ab28b7e0cd2594ed94562
                                  • Instruction Fuzzy Hash: B01122B58003489FDB10DF9AD445BDEBBF8EB48320F108429E558A7200C375A980CFA1
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00F6AFFE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: d882957a1ac8235169737c96dd94079c52a4576166bbbbed5f2d2f8f3c39f036
                                  • Instruction ID: 0f8ed44535b2857915298a01e1d2f9f3839836de4352225d7086c82bb66f76de
                                  • Opcode Fuzzy Hash: d882957a1ac8235169737c96dd94079c52a4576166bbbbed5f2d2f8f3c39f036
                                  • Instruction Fuzzy Hash: 0A1110B5C002499FCB10CF9AC444ADEFBF8AF88324F10842AD428A7210D375A545CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678816125.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f0d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d7b19897eec0229e37733f5270c8a870a778bf04469c5fb1937215474179e09c
                                  • Instruction ID: 5bb81a981a12de8bc92eb1beff0904c588db825bd810185c3c378aa8a04f5ca4
                                  • Opcode Fuzzy Hash: d7b19897eec0229e37733f5270c8a870a778bf04469c5fb1937215474179e09c
                                  • Instruction Fuzzy Hash: 1521377A500204DFDB05DF54D9C0B2BBF65FB98324F20C169E9094B296C336E856FBA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678816125.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f0d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b938764099fee6b559d0b0e8dd120e947178a747b6ef0ae1111843315bdb934a
                                  • Instruction ID: e5e096d20b38e867cd850ea8175a0f71b96472bc9a7922dfba8138e14adfd728
                                  • Opcode Fuzzy Hash: b938764099fee6b559d0b0e8dd120e947178a747b6ef0ae1111843315bdb934a
                                  • Instruction Fuzzy Hash: 3B212576900240DFCB05DF54D9C0B26BF65FB98328F28C569EC090B296C336D856FAA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678855174.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f1d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bd4241cb9168b443275b13eb99a7a5ec70bf32fec000231ac4fb140f91c0cdb5
                                  • Instruction ID: 8b86c33cc68e2577360f38a32aade5ff8174c1547228f3b47634756c5876a6d4
                                  • Opcode Fuzzy Hash: bd4241cb9168b443275b13eb99a7a5ec70bf32fec000231ac4fb140f91c0cdb5
                                  • Instruction Fuzzy Hash: A821F575504200DFCB14DF14D984B56BB75EB88324F20C56DD80A4B25AC33AD887DA61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678855174.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f1d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bd0581a60090b6af27bd246cd7bcb85cea4b3af54848e75445cf93538388d94a
                                  • Instruction ID: 84d2f8296d100258e8cf4b29a43c59f3b1075f1e09a8c79adf52549408944d80
                                  • Opcode Fuzzy Hash: bd0581a60090b6af27bd246cd7bcb85cea4b3af54848e75445cf93538388d94a
                                  • Instruction Fuzzy Hash: 492180755093808FCB02CF24D994756BF71EB46314F28C5EAD8498F2A7C33A984ADB62
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678816125.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f0d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                  • Instruction ID: 501511c095f53ef4eb63a3e9a813edb89b057594f5a8156ac4ca4eefdf1ddd92
                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                  • Instruction Fuzzy Hash: 1A110376804240CFCB16CF44D5C4B16BF71FB94324F24C2A9DC090B256C33AE85AEBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678816125.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f0d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                  • Instruction ID: 8e7c3c3daa4629864de684cd3b2e8031863c7d9cd74ad55bad479412445f3c90
                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                  • Instruction Fuzzy Hash: B211D676904240CFCB15CF54D9C4B26BF71FB94328F28C5A9DC450B656C336D45ADB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678816125.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f0d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: de44594386b8da6f83c923430535ea1920225c52fa54f61a26c25a049a7a3930
                                  • Instruction ID: 0e6e08566c4e4fc3100b6d6b2d64d71a323bcf32815972fb14d510080a10c2e5
                                  • Opcode Fuzzy Hash: de44594386b8da6f83c923430535ea1920225c52fa54f61a26c25a049a7a3930
                                  • Instruction Fuzzy Hash: E001A7714083449AE7144A69CD84767FFD8EF41334F18C52AED094A1D6D279D840F671
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678816125.0000000000F0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f0d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c911979eed98f430dc60c9d01fbecef11ac51ef3bcca12cc152e6bf00b3b19a
                                  • Instruction ID: db8520b1be97ef69804ab94627f40cf9f67f5d3d3887ef17883199116b7df649
                                  • Opcode Fuzzy Hash: 8c911979eed98f430dc60c9d01fbecef11ac51ef3bcca12cc152e6bf00b3b19a
                                  • Instruction Fuzzy Hash: A8F062714043449EE7148A1ACD84B66FFE8EF91734F18C55AED084E2C6C2799844DA71
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1680792868.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2dc0000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7358ea827cff09dda800bfd45c8b741ffab0a7ed949cef4b534350fa0bf4dd15
                                  • Instruction ID: 1c410142622e1b2eb199b13520117139ddde22ed05c44b77a24684817600dd33
                                  • Opcode Fuzzy Hash: 7358ea827cff09dda800bfd45c8b741ffab0a7ed949cef4b534350fa0bf4dd15
                                  • Instruction Fuzzy Hash: 0D1275B24117458BE731CF65E94C1A93BB1BB85328B908309D2616F2FADBB8954FCF44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f93d288d075082189002035aec876a43fe1e475484b1cfe6923d7376ad7a1818
                                  • Instruction ID: 43a0dda44df3527216c17f6787b3ef6d50445def691b8405f5e1975c41149bdf
                                  • Opcode Fuzzy Hash: f93d288d075082189002035aec876a43fe1e475484b1cfe6923d7376ad7a1818
                                  • Instruction Fuzzy Hash: B0E13B74E00219DFCB14DFA9D5809AEFBB2FF89304F249569E504AB359DB31A942CF60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 964b7b2dca0be7358c9c132fbe8afe304cc2c1f87bb514215509e9f1064fc53a
                                  • Instruction ID: 7324830cb31ae697c3b2980879830bef744b636c8af52ead8ea10850fbd5a476
                                  • Opcode Fuzzy Hash: 964b7b2dca0be7358c9c132fbe8afe304cc2c1f87bb514215509e9f1064fc53a
                                  • Instruction Fuzzy Hash: 32E10974E002199FCB14DFA9D5809AEFBF2BF89304F249169E514AB35AD731A942CF60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c051b319d22000a1932b23ed1114ebd057921fa171d9570cb373d87ee50d8af1
                                  • Instruction ID: 4ec6b1ca6d8b9b6cd7b7107ed7db67e00b5783a3fa159c7d0f2374f06b6dbde7
                                  • Opcode Fuzzy Hash: c051b319d22000a1932b23ed1114ebd057921fa171d9570cb373d87ee50d8af1
                                  • Instruction Fuzzy Hash: 11E11A74E002198FCB14DFA9D5809AEFBF2FF89304F249169E518AB356D731A942CF61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8720562cdac13335c11cf4b0abb9232188cbd191b62b9aa860e31cc086da8dbf
                                  • Instruction ID: b490f88bb028e9d75f53bfb20f1243e5f7f4d90715e5cb03ab9b17ffd4e9f810
                                  • Opcode Fuzzy Hash: 8720562cdac13335c11cf4b0abb9232188cbd191b62b9aa860e31cc086da8dbf
                                  • Instruction Fuzzy Hash: 97E1F874E00219DFCB14DFA9D5809AEFBF2BF89304F249169E514AB356D731A942CFA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c09f8cbd9209b48956c7b5baf9e8ca5005a079a505481d8eea281e7877c7c5a6
                                  • Instruction ID: b81dc6e8e2a7a6d3de879495443a5797decb79e0ea641fbc7ab3b9d640085280
                                  • Opcode Fuzzy Hash: c09f8cbd9209b48956c7b5baf9e8ca5005a079a505481d8eea281e7877c7c5a6
                                  • Instruction Fuzzy Hash: A8E1EA74E002598FCB14DFA9D5809AEFBF2FF89304F249169E414AB356D731A942CFA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1678983524.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_f60000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ee8067d36be08808b5fbb05818300698e81104194754c7c3d52dfd778a0f6553
                                  • Instruction ID: a4b60af1ab1a56ba47597f5a48ca600d45a61be974242da669cc7c168cc4525b
                                  • Opcode Fuzzy Hash: ee8067d36be08808b5fbb05818300698e81104194754c7c3d52dfd778a0f6553
                                  • Instruction Fuzzy Hash: DBA17D32E00209CFCF15DFB4D84059EB7B2FF85310B2585BAE806AB265DB75E919DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1680792868.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2dc0000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ea48a4ed673437d7f069f9e4774727661b8c15f2b40dffda0e4d15e1a47b9f1f
                                  • Instruction ID: d3ff6cbddc7624923c6e689ff2098f444bdbad35908c9c533a9534d3bed9bda7
                                  • Opcode Fuzzy Hash: ea48a4ed673437d7f069f9e4774727661b8c15f2b40dffda0e4d15e1a47b9f1f
                                  • Instruction Fuzzy Hash: 0BD127B28017468FD721CF65E9481A93BB1BB85324F548309D1616F2FADBB8A48FCF44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 82835ba809d1b201c513ed8683317288bcfe2cc04180df52e6ec676e6eced0f9
                                  • Instruction ID: 9d8bbce7a1f9d3bb5fad78f0a8ed1b28dc03eac34c8414c5715e5dbfeebbd761
                                  • Opcode Fuzzy Hash: 82835ba809d1b201c513ed8683317288bcfe2cc04180df52e6ec676e6eced0f9
                                  • Instruction Fuzzy Hash: 2C511D75E002198BDB14DFA9D5405AEBBF2FF89304F24D169D518AB316D731AA42CFA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1687654202.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4e40000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 19f89669ff418015f80e6a85859e19f3d39cded37e01e7e0eb81890f6e4e4f01
                                  • Instruction ID: 09dc28b5195488e7ee8afa0482f73a66af1cd971c2170895d13942204d93dd03
                                  • Opcode Fuzzy Hash: 19f89669ff418015f80e6a85859e19f3d39cded37e01e7e0eb81890f6e4e4f01
                                  • Instruction Fuzzy Hash: 58513970E002199FCB14DFA9D5805AEFBF2FF89304F24916AD518AB356D731AA41CFA0

                                  Execution Graph

                                  Execution Coverage:7.5%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:85
                                  Total number of Limit Nodes:7
                                  execution_graph 14969 329bf08 14972 329bff0 14969->14972 14970 329bf17 14973 329c011 14972->14973 14974 329c034 14972->14974 14973->14974 14980 329c689 14973->14980 14984 329c698 14973->14984 14974->14970 14975 329c02c 14975->14974 14976 329c238 GetModuleHandleW 14975->14976 14977 329c265 14976->14977 14977->14970 14981 329c694 14980->14981 14982 329c6d1 14981->14982 14988 329c294 14981->14988 14982->14975 14985 329c699 14984->14985 14986 329c6d1 14985->14986 14987 329c294 LoadLibraryExW 14985->14987 14986->14975 14987->14986 14989 329c878 LoadLibraryExW 14988->14989 14991 329c8f1 14989->14991 14991->14982 14992 3294668 14993 3294669 14992->14993 14998 3296de0 14993->14998 14996 3294704 14999 3296e05 14998->14999 15007 3296edf 14999->15007 15011 3296ef0 14999->15011 15000 32946e9 15003 329421c 15000->15003 15004 3294227 15003->15004 15019 3298560 15004->15019 15006 3298806 15006->14996 15009 3296ee4 15007->15009 15008 3296ff4 15008->15008 15009->15008 15015 3296414 15009->15015 15012 3296ef1 15011->15012 15013 3296ff4 15012->15013 15014 3296414 CreateActCtxA 15012->15014 15014->15013 15016 3297370 CreateActCtxA 15015->15016 15018 3297433 15016->15018 15020 329856b 15019->15020 15023 3298580 15020->15023 15022 32988dd 15022->15006 15024 329858b 15023->15024 15027 32985b0 15024->15027 15026 32989ba 15026->15022 15028 32985bb 15027->15028 15031 32985e0 15028->15031 15030 3298aad 15030->15026 15033 32985eb 15031->15033 15032 3299ed1 15032->15030 15033->15032 15036 329df60 15033->15036 15040 329df70 15033->15040 15037 329df64 15036->15037 15038 329dfb5 15037->15038 15044 329e120 15037->15044 15038->15032 15042 329df91 15040->15042 15041 329dfb5 15041->15032 15042->15041 15043 329e120 KiUserCallbackDispatcher 15042->15043 15043->15041 15045 329e12d 15044->15045 15046 329e166 15045->15046 15048 329c464 15045->15048 15046->15038 15049 329c46f 15048->15049 15051 329e1d8 15049->15051 15052 329c498 15049->15052 15051->15051 15053 329c4a3 15052->15053 15054 32985e0 KiUserCallbackDispatcher 15053->15054 15055 329e247 15054->15055 15058 329e2c0 15055->15058 15056 329e256 15056->15051 15059 329e2ee 15058->15059 15060 329e3ba KiUserCallbackDispatcher 15059->15060 15061 329e3bf 15059->15061 15060->15061 15062 3296540 15063 3296545 15062->15063 15067 329670f 15063->15067 15073 3296720 15063->15073 15064 3296673 15068 329678f DuplicateHandle 15067->15068 15069 3296713 15067->15069 15072 329681e 15068->15072 15077 329611c 15069->15077 15072->15064 15074 3296721 15073->15074 15075 329611c DuplicateHandle 15074->15075 15076 329674e 15075->15076 15076->15064 15078 3296788 DuplicateHandle 15077->15078 15079 329674e 15078->15079 15079->15064

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 560 3297364-3297431 CreateActCtxA 562 329743a-3297494 560->562 563 3297433-3297439 560->563 570 32974a3-32974a7 562->570 571 3297496-3297499 562->571 563->562 572 32974a9-32974b5 570->572 573 32974b8 570->573 571->570 572->573 575 32974b9 573->575 575->575
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 03297421
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID: U
                                  • API String ID: 2289755597-3372436214
                                  • Opcode ID: 9378bea89589030b1c28299639b50b26f6ed48e8a3fb8128445f12a3d4d8fb11
                                  • Instruction ID: 2bc46bbec65adae237404690c7afcc89f74dc7471ca38511726f8369c75ea0ca
                                  • Opcode Fuzzy Hash: 9378bea89589030b1c28299639b50b26f6ed48e8a3fb8128445f12a3d4d8fb11
                                  • Instruction Fuzzy Hash: 8C41DFB0C10629CFDB24CFA9C944BCEBBB5BF48304F24806AD458AB255DB756985CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 576 329bff0-329c00f 577 329c03b-329c03f 576->577 578 329c011-329c01e call 329af60 576->578 579 329c041-329c04b 577->579 580 329c053-329c094 577->580 585 329c020 578->585 586 329c034 578->586 579->580 587 329c0a1-329c0af 580->587 588 329c096-329c09e 580->588 631 329c026 call 329c689 585->631 632 329c026 call 329c698 585->632 586->577 589 329c0b1-329c0b6 587->589 590 329c0d3-329c0d5 587->590 588->587 594 329c0b8-329c0bf call 329af6c 589->594 595 329c0c1 589->595 593 329c0d8-329c0df 590->593 591 329c02c-329c02e 591->586 592 329c170-329c230 591->592 626 329c238-329c263 GetModuleHandleW 592->626 627 329c232-329c235 592->627 597 329c0ec-329c0f3 593->597 598 329c0e1-329c0e9 593->598 596 329c0c3-329c0d1 594->596 595->596 596->593 600 329c100-329c109 call 329af7c 597->600 601 329c0f5-329c0fd 597->601 598->597 607 329c10b-329c113 600->607 608 329c116-329c11b 600->608 601->600 607->608 609 329c139-329c146 608->609 610 329c11d-329c124 608->610 616 329c169-329c16f 609->616 617 329c148-329c166 609->617 610->609 612 329c126-329c136 call 329af8c call 329af9c 610->612 612->609 617->616 628 329c26c-329c280 626->628 629 329c265-329c26b 626->629 627->626 629->628 631->591 632->591
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0329C256
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 2ba7d3cb350f87f2b66c958cfb86578d08f6f536eb3cc8ad4d1b9c3021ac2d14
                                  • Instruction ID: a2f98afdb3290c86b07d326539c6d5a92c99a20d7a6b5f39a02fc0ad7734cbe3
                                  • Opcode Fuzzy Hash: 2ba7d3cb350f87f2b66c958cfb86578d08f6f536eb3cc8ad4d1b9c3021ac2d14
                                  • Instruction Fuzzy Hash: D58157B0A10B558FEB24DF29C44075ABBF5FF88300F04896ED486DBA50D775E889CB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 633 3296414-3297431 CreateActCtxA 636 329743a-3297494 633->636 637 3297433-3297439 633->637 644 32974a3-32974a7 636->644 645 3297496-3297499 636->645 637->636 646 32974a9-32974b5 644->646 647 32974b8 644->647 645->644 646->647 649 32974b9 647->649 649->649
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 03297421
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 5f945fb0ac6d493d8236274ff33dc8884595477b3afd6c996313ba7a649af412
                                  • Instruction ID: d4a973c4036a8cb4aeacb4a2400d57fc683e0d641369c56bcd22887ff2626a02
                                  • Opcode Fuzzy Hash: 5f945fb0ac6d493d8236274ff33dc8884595477b3afd6c996313ba7a649af412
                                  • Instruction Fuzzy Hash: 7341DFB0C1061DCFDB24CFA9C844BCEBBB5BF48304F24806AD408AB255DBB56985CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 650 329670f-3296711 651 329678f-329681c DuplicateHandle 650->651 652 3296713-329671a 650->652 653 329681e-3296824 651->653 654 3296825-3296842 651->654 655 329671c-3296720 652->655 656 3296721-3296749 call 329611c 652->656 653->654 655->656 660 329674e-3296774 656->660
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0329674E,?,?,?,?,?), ref: 0329680F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 75b9d9122d2267a8483096e209c1ee9c0496d6f45b7368636d3136b39e4910f1
                                  • Instruction ID: 12bb43843b2aacdfb447fb9289a3693130ee1c2e742a84b90e9f3d9818ed3fd5
                                  • Opcode Fuzzy Hash: 75b9d9122d2267a8483096e209c1ee9c0496d6f45b7368636d3136b39e4910f1
                                  • Instruction Fuzzy Hash: DE31487A900248AFDF01CF99D844AEEBFF5FB48320F14806AE954A7321C7759954DFA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 664 3296780-3296783 666 3296788-329681c DuplicateHandle 664->666 667 329681e-3296824 666->667 668 3296825-3296842 666->668 667->668
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0329674E,?,?,?,?,?), ref: 0329680F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 4f02b872f6657fe7e8a2483e5895e981c371840952e62463da8617b965415ac8
                                  • Instruction ID: bb913c8dba2e50a7203a46352caa68d2639943c5f5a152edd9998586155b4d0a
                                  • Opcode Fuzzy Hash: 4f02b872f6657fe7e8a2483e5895e981c371840952e62463da8617b965415ac8
                                  • Instruction Fuzzy Hash: AD21F4B59002489FDB10CF9AD884ADEBFF4FB48320F14846AE858A3211D374A944CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 671 329611c-329681c DuplicateHandle 673 329681e-3296824 671->673 674 3296825-3296842 671->674 673->674
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0329674E,?,?,?,?,?), ref: 0329680F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 28420e90b855805e9885c89f649c8764a0c5488d8669e54a7fe05531ef323967
                                  • Instruction ID: 6dab7778afd64c778b6e36d395468bc60e512e757a83bfa2a5d27bd31f30a7a8
                                  • Opcode Fuzzy Hash: 28420e90b855805e9885c89f649c8764a0c5488d8669e54a7fe05531ef323967
                                  • Instruction Fuzzy Hash: E721E5B59002589FDB10CF9AD984AEEFBF4FB48320F14845AE954A7310D375A944CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 677 329c294-329c8b8 679 329c8ba-329c8bd 677->679 680 329c8c0-329c8ef LoadLibraryExW 677->680 679->680 681 329c8f8-329c915 680->681 682 329c8f1-329c8f7 680->682 682->681
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0329C6D1,00000800,00000000,00000000), ref: 0329C8E2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 19a12e1518c04c346ad4cbc59db76b24bda9f635c09082064a824bd55cc30300
                                  • Instruction ID: 27e140e2a87177920c31211e23e88091b83101770c348d30e63311625d18a0e6
                                  • Opcode Fuzzy Hash: 19a12e1518c04c346ad4cbc59db76b24bda9f635c09082064a824bd55cc30300
                                  • Instruction Fuzzy Hash: 711112B6D003599FDB20DF9AD448ADEFBF4FB88310F14846AE419A7210C3B5A585CFA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 685 329c870-329c8b8 686 329c8ba-329c8bd 685->686 687 329c8c0-329c8ef LoadLibraryExW 685->687 686->687 688 329c8f8-329c915 687->688 689 329c8f1-329c8f7 687->689 689->688
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0329C6D1,00000800,00000000,00000000), ref: 0329C8E2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 2dffc8f98d3ba0b4a33896ac8c71eee99f76d86e0e3aa95f11787fee99e86e4d
                                  • Instruction ID: a71e8b49c622cc7f4af075db0ea1983f79fbe707d8f5880bebba2fa111a9ed4b
                                  • Opcode Fuzzy Hash: 2dffc8f98d3ba0b4a33896ac8c71eee99f76d86e0e3aa95f11787fee99e86e4d
                                  • Instruction Fuzzy Hash: DE114FB6C003498FDB20CFAAD444ADEFBF0BB48310F14842ED429A7200C379A588CFA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 692 329c1f0-329c230 693 329c238-329c263 GetModuleHandleW 692->693 694 329c232-329c235 692->694 695 329c26c-329c280 693->695 696 329c265-329c26b 693->696 694->693 696->695
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0329C256
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707781990.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3290000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 5283ef53f1049026dc98bed2ba205a20312ce8345041edf8affab8ba1d155bd9
                                  • Instruction ID: 0eb6ecc47eb8f1c6e1e26b134656ca01f21dd212541d0e350a34a9cde4fe48cc
                                  • Opcode Fuzzy Hash: 5283ef53f1049026dc98bed2ba205a20312ce8345041edf8affab8ba1d155bd9
                                  • Instruction Fuzzy Hash: 7811E0B5C002598FDB10DF9AC444ADEFBF4AB88324F14852AD469BB210C375A585CFA5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707291392.000000000301D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0301D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_301d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e40e5fda20867bd0861f404ff1c50b5f2f21211bf3f726dfce2ea024156360b1
                                  • Instruction ID: 458e2bcc8f488e4f479ac4320810e74dff9c86bc08a01cd19eb1e6334610bef6
                                  • Opcode Fuzzy Hash: e40e5fda20867bd0861f404ff1c50b5f2f21211bf3f726dfce2ea024156360b1
                                  • Instruction Fuzzy Hash: 7C210475604200DFCB16DF14D9C4B2ABFA5FB84314F24C9ADD90A4B256C33BD467CA61
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1707291392.000000000301D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0301D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_301d000_doc_rfq Oferta KH 09281.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 98571ca9a1c7f91300579d2d0c28915f0b47492da43f47c56a0bd8c2adb485b6
                                  • Instruction ID: 9093c88671bf1d43ac0e4f92c892cc909082a489aa632a084f8e455d242b0146
                                  • Opcode Fuzzy Hash: 98571ca9a1c7f91300579d2d0c28915f0b47492da43f47c56a0bd8c2adb485b6
                                  • Instruction Fuzzy Hash: A521A1755093808FCB13CF24D994B15BFB1EB46214F28C5DAD8498F2A7C33AD81ACB62

                                  Execution Graph

                                  Execution Coverage:9.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:243
                                  Total number of Limit Nodes:5
                                  execution_graph 35784 c0d040 35785 c0d086 35784->35785 35789 c0d618 35785->35789 35792 c0d628 35785->35792 35786 c0d173 35795 c0d27c 35789->35795 35793 c0d27c DuplicateHandle 35792->35793 35794 c0d656 35792->35794 35793->35794 35794->35786 35796 c0d690 DuplicateHandle 35795->35796 35797 c0d656 35796->35797 35797->35786 35869 c0acb0 35873 c0ada8 35869->35873 35881 c0ad97 35869->35881 35870 c0acbf 35874 c0adb9 35873->35874 35875 c0addc 35873->35875 35874->35875 35889 c0b040 35874->35889 35893 c0b031 35874->35893 35875->35870 35876 c0add4 35876->35875 35877 c0afe0 GetModuleHandleW 35876->35877 35878 c0b00d 35877->35878 35878->35870 35882 c0adb9 35881->35882 35883 c0addc 35881->35883 35882->35883 35887 c0b040 LoadLibraryExW 35882->35887 35888 c0b031 LoadLibraryExW 35882->35888 35883->35870 35884 c0add4 35884->35883 35885 c0afe0 GetModuleHandleW 35884->35885 35886 c0b00d 35885->35886 35886->35870 35887->35884 35888->35884 35890 c0b054 35889->35890 35891 c0b079 35890->35891 35897 c0a130 35890->35897 35891->35876 35894 c0b054 35893->35894 35895 c0a130 LoadLibraryExW 35894->35895 35896 c0b079 35894->35896 35895->35896 35896->35876 35898 c0b220 LoadLibraryExW 35897->35898 35900 c0b299 35898->35900 35900->35891 35901 46b8b99 35902 46b8b25 35901->35902 35906 46b93b0 35901->35906 35911 46b93c0 35901->35911 35916 46b9426 35901->35916 35907 46b93b5 35906->35907 35922 46b96e9 35907->35922 35940 46b96f8 35907->35940 35908 46b93e2 35908->35902 35912 46b93da 35911->35912 35914 46b96e9 12 API calls 35912->35914 35915 46b96f8 12 API calls 35912->35915 35913 46b93e2 35913->35902 35914->35913 35915->35913 35917 46b93b4 35916->35917 35919 46b9429 35916->35919 35920 46b96e9 12 API calls 35917->35920 35921 46b96f8 12 API calls 35917->35921 35918 46b93e2 35918->35902 35919->35902 35920->35918 35921->35918 35923 46b970d 35922->35923 35937 46b971f 35923->35937 35958 46b9e38 35923->35958 35966 46b9a58 35923->35966 35971 46b9cbb 35923->35971 35975 46b9dfb 35923->35975 35980 46b9964 35923->35980 35988 46b9ca6 35923->35988 35996 46b9b81 35923->35996 36000 46b9a63 35923->36000 36005 46b9c2c 35923->36005 36010 46ba1ed 35923->36010 36015 46ba14e 35923->36015 36023 46b984f 35923->36023 36027 46b99ab 35923->36027 36032 46b98b6 35923->36032 36040 46b993c 35923->36040 35937->35908 35941 46b970d 35940->35941 35942 46b99ab 2 API calls 35941->35942 35943 46b984f 2 API calls 35941->35943 35944 46ba14e 4 API calls 35941->35944 35945 46ba1ed 2 API calls 35941->35945 35946 46b9c2c 2 API calls 35941->35946 35947 46b9a63 2 API calls 35941->35947 35948 46b9b81 2 API calls 35941->35948 35949 46b9ca6 4 API calls 35941->35949 35950 46b9964 4 API calls 35941->35950 35951 46b9dfb 2 API calls 35941->35951 35952 46b9cbb 2 API calls 35941->35952 35953 46b9a58 2 API calls 35941->35953 35954 46b9e38 4 API calls 35941->35954 35955 46b971f 35941->35955 35956 46b993c 4 API calls 35941->35956 35957 46b98b6 4 API calls 35941->35957 35942->35955 35943->35955 35944->35955 35945->35955 35946->35955 35947->35955 35948->35955 35949->35955 35950->35955 35951->35955 35952->35955 35953->35955 35954->35955 35955->35908 35956->35955 35957->35955 35959 46b9940 35958->35959 35960 46b9e12 35959->35960 36048 46b7c99 35959->36048 36052 46b7ca0 35959->36052 36056 46b77b8 35960->36056 36060 46b77b0 35960->36060 35961 46ba21d 35967 46b9f6d 35966->35967 36064 46b7f28 35967->36064 36068 46b7f20 35967->36068 35968 46b9f10 35968->35937 35973 46b7c99 Wow64SetThreadContext 35971->35973 35974 46b7ca0 Wow64SetThreadContext 35971->35974 35972 46b9cd5 35973->35972 35974->35972 35976 46b9e01 35975->35976 35978 46b77b8 ResumeThread 35976->35978 35979 46b77b0 ResumeThread 35976->35979 35977 46ba21d 35978->35977 35979->35977 35981 46b9940 35980->35981 35982 46b9e12 35981->35982 35986 46b7c99 Wow64SetThreadContext 35981->35986 35987 46b7ca0 Wow64SetThreadContext 35981->35987 35984 46b77b8 ResumeThread 35982->35984 35985 46b77b0 ResumeThread 35982->35985 35983 46ba21d 35984->35983 35985->35983 35986->35981 35987->35981 35989 46b98d9 35988->35989 35990 46b9e12 35989->35990 35992 46b7c99 Wow64SetThreadContext 35989->35992 35993 46b7ca0 Wow64SetThreadContext 35989->35993 35994 46b77b8 ResumeThread 35990->35994 35995 46b77b0 ResumeThread 35990->35995 35991 46ba21d 35992->35989 35993->35989 35994->35991 35995->35991 36072 46b7d78 35996->36072 36076 46b7d70 35996->36076 35997 46b9b9f 36001 46b9a70 36000->36001 36080 46b7e38 36001->36080 36084 46b7e30 36001->36084 36002 46ba0d6 36006 46b9c35 36005->36006 36008 46b7e38 WriteProcessMemory 36006->36008 36009 46b7e30 WriteProcessMemory 36006->36009 36007 46b9da9 36008->36007 36009->36007 36011 46ba208 36010->36011 36013 46b77b8 ResumeThread 36011->36013 36014 46b77b0 ResumeThread 36011->36014 36012 46ba21d 36013->36012 36014->36012 36016 46b9940 36015->36016 36017 46b9e12 36016->36017 36019 46b7c99 Wow64SetThreadContext 36016->36019 36020 46b7ca0 Wow64SetThreadContext 36016->36020 36021 46b77b8 ResumeThread 36017->36021 36022 46b77b0 ResumeThread 36017->36022 36018 46ba21d 36019->36016 36020->36016 36021->36018 36022->36018 36088 46b84c0 36023->36088 36092 46b84b4 36023->36092 36028 46b99ce 36027->36028 36030 46b7e38 WriteProcessMemory 36028->36030 36031 46b7e30 WriteProcessMemory 36028->36031 36029 46b9963 36030->36029 36031->36029 36033 46b98d9 36032->36033 36034 46b9e12 36033->36034 36038 46b7c99 Wow64SetThreadContext 36033->36038 36039 46b7ca0 Wow64SetThreadContext 36033->36039 36036 46b77b8 ResumeThread 36034->36036 36037 46b77b0 ResumeThread 36034->36037 36035 46ba21d 36036->36035 36037->36035 36038->36033 36039->36033 36041 46b9940 36040->36041 36042 46b9e12 36041->36042 36046 46b7c99 Wow64SetThreadContext 36041->36046 36047 46b7ca0 Wow64SetThreadContext 36041->36047 36044 46b77b8 ResumeThread 36042->36044 36045 46b77b0 ResumeThread 36042->36045 36043 46ba21d 36044->36043 36045->36043 36046->36041 36047->36041 36049 46b7ce5 Wow64SetThreadContext 36048->36049 36051 46b7d2d 36049->36051 36051->35959 36053 46b7ce5 Wow64SetThreadContext 36052->36053 36055 46b7d2d 36053->36055 36055->35959 36057 46b77f8 ResumeThread 36056->36057 36059 46b7829 36057->36059 36059->35961 36061 46b77f8 ResumeThread 36060->36061 36063 46b7829 36061->36063 36063->35961 36065 46b7f73 ReadProcessMemory 36064->36065 36067 46b7fb7 36065->36067 36067->35968 36069 46b7f73 ReadProcessMemory 36068->36069 36071 46b7fb7 36069->36071 36071->35968 36073 46b7db8 VirtualAllocEx 36072->36073 36075 46b7df5 36073->36075 36075->35997 36077 46b7db8 VirtualAllocEx 36076->36077 36079 46b7df5 36077->36079 36079->35997 36081 46b7e80 WriteProcessMemory 36080->36081 36083 46b7ed7 36081->36083 36083->36002 36085 46b7e80 WriteProcessMemory 36084->36085 36087 46b7ed7 36085->36087 36087->36002 36089 46b8549 36088->36089 36089->36089 36090 46b86ae CreateProcessA 36089->36090 36091 46b870b 36090->36091 36091->36091 36093 46b8549 36092->36093 36093->36093 36094 46b86ae CreateProcessA 36093->36094 36095 46b870b 36094->36095 36095->36095 35841 46ba608 35842 46ba62e 35841->35842 35843 46ba793 35841->35843 35842->35843 35845 46b8020 35842->35845 35846 46ba888 PostMessageW 35845->35846 35847 46ba8f4 35846->35847 35847->35842 35798 8bd01c 35799 8bd034 35798->35799 35800 8bd08e 35799->35800 35803 4c42818 35799->35803 35808 4c42809 35799->35808 35804 4c42845 35803->35804 35805 4c42877 35804->35805 35813 4c42990 35804->35813 35818 4c429a0 35804->35818 35805->35805 35809 4c42845 35808->35809 35810 4c42877 35809->35810 35811 4c42990 2 API calls 35809->35811 35812 4c429a0 2 API calls 35809->35812 35810->35810 35811->35810 35812->35810 35815 4c429b4 35813->35815 35814 4c42a40 35814->35805 35823 4c42a48 35815->35823 35826 4c42a58 35815->35826 35820 4c429b4 35818->35820 35819 4c42a40 35819->35805 35821 4c42a48 2 API calls 35820->35821 35822 4c42a58 2 API calls 35820->35822 35821->35819 35822->35819 35824 4c42a69 35823->35824 35829 4c44020 35823->35829 35824->35814 35827 4c42a69 35826->35827 35828 4c44020 2 API calls 35826->35828 35827->35814 35828->35827 35833 4c44040 35829->35833 35837 4c44030 35829->35837 35830 4c4402a 35830->35824 35834 4c44082 35833->35834 35835 4c44089 35833->35835 35834->35835 35836 4c440da CallWindowProcW 35834->35836 35835->35830 35836->35835 35838 4c44082 35837->35838 35839 4c44089 35837->35839 35838->35839 35840 4c440da CallWindowProcW 35838->35840 35839->35830 35840->35839 35848 c04668 35849 c0467a 35848->35849 35850 c04686 35849->35850 35852 c04779 35849->35852 35853 c0479d 35852->35853 35857 c04879 35853->35857 35861 c04888 35853->35861 35858 c048af 35857->35858 35859 c0498c 35858->35859 35865 c044c4 35858->35865 35863 c048af 35861->35863 35862 c0498c 35862->35862 35863->35862 35864 c044c4 CreateActCtxA 35863->35864 35864->35862 35866 c05918 CreateActCtxA 35865->35866 35868 c059db 35866->35868

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1216 46b84b4-46b8555 1218 46b858e-46b85ae 1216->1218 1219 46b8557-46b8561 1216->1219 1224 46b85b0-46b85ba 1218->1224 1225 46b85e7-46b8616 1218->1225 1219->1218 1220 46b8563-46b8565 1219->1220 1222 46b8588-46b858b 1220->1222 1223 46b8567-46b8571 1220->1223 1222->1218 1226 46b8573 1223->1226 1227 46b8575-46b8584 1223->1227 1224->1225 1228 46b85bc-46b85be 1224->1228 1235 46b8618-46b8622 1225->1235 1236 46b864f-46b8709 CreateProcessA 1225->1236 1226->1227 1227->1227 1229 46b8586 1227->1229 1230 46b85e1-46b85e4 1228->1230 1231 46b85c0-46b85ca 1228->1231 1229->1222 1230->1225 1233 46b85ce-46b85dd 1231->1233 1234 46b85cc 1231->1234 1233->1233 1237 46b85df 1233->1237 1234->1233 1235->1236 1238 46b8624-46b8626 1235->1238 1247 46b870b-46b8711 1236->1247 1248 46b8712-46b8798 1236->1248 1237->1230 1239 46b8649-46b864c 1238->1239 1240 46b8628-46b8632 1238->1240 1239->1236 1242 46b8636-46b8645 1240->1242 1243 46b8634 1240->1243 1242->1242 1244 46b8647 1242->1244 1243->1242 1244->1239 1247->1248 1258 46b879a-46b879e 1248->1258 1259 46b87a8-46b87ac 1248->1259 1258->1259 1260 46b87a0 1258->1260 1261 46b87ae-46b87b2 1259->1261 1262 46b87bc-46b87c0 1259->1262 1260->1259 1261->1262 1263 46b87b4 1261->1263 1264 46b87c2-46b87c6 1262->1264 1265 46b87d0-46b87d4 1262->1265 1263->1262 1264->1265 1266 46b87c8 1264->1266 1267 46b87e6-46b87ed 1265->1267 1268 46b87d6-46b87dc 1265->1268 1266->1265 1269 46b87ef-46b87fe 1267->1269 1270 46b8804 1267->1270 1268->1267 1269->1270 1272 46b8805 1270->1272 1272->1272
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 046B86F6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: fd399f2742176c8490d8430ea41b04d8f75ee7de701ebf61c14aa5bb7ffcbc44
                                  • Instruction ID: b6aab547b4818c2d38f7e77aacc9467c562358626033444e4ca6fd758ead4aee
                                  • Opcode Fuzzy Hash: fd399f2742176c8490d8430ea41b04d8f75ee7de701ebf61c14aa5bb7ffcbc44
                                  • Instruction Fuzzy Hash: D5A18C71D00219DFEB20DF69C8417DEBBB6BF48314F1485A9E888A7250EB74A9C5CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1273 46b84c0-46b8555 1275 46b858e-46b85ae 1273->1275 1276 46b8557-46b8561 1273->1276 1281 46b85b0-46b85ba 1275->1281 1282 46b85e7-46b8616 1275->1282 1276->1275 1277 46b8563-46b8565 1276->1277 1279 46b8588-46b858b 1277->1279 1280 46b8567-46b8571 1277->1280 1279->1275 1283 46b8573 1280->1283 1284 46b8575-46b8584 1280->1284 1281->1282 1285 46b85bc-46b85be 1281->1285 1292 46b8618-46b8622 1282->1292 1293 46b864f-46b8709 CreateProcessA 1282->1293 1283->1284 1284->1284 1286 46b8586 1284->1286 1287 46b85e1-46b85e4 1285->1287 1288 46b85c0-46b85ca 1285->1288 1286->1279 1287->1282 1290 46b85ce-46b85dd 1288->1290 1291 46b85cc 1288->1291 1290->1290 1294 46b85df 1290->1294 1291->1290 1292->1293 1295 46b8624-46b8626 1292->1295 1304 46b870b-46b8711 1293->1304 1305 46b8712-46b8798 1293->1305 1294->1287 1296 46b8649-46b864c 1295->1296 1297 46b8628-46b8632 1295->1297 1296->1293 1299 46b8636-46b8645 1297->1299 1300 46b8634 1297->1300 1299->1299 1301 46b8647 1299->1301 1300->1299 1301->1296 1304->1305 1315 46b879a-46b879e 1305->1315 1316 46b87a8-46b87ac 1305->1316 1315->1316 1317 46b87a0 1315->1317 1318 46b87ae-46b87b2 1316->1318 1319 46b87bc-46b87c0 1316->1319 1317->1316 1318->1319 1320 46b87b4 1318->1320 1321 46b87c2-46b87c6 1319->1321 1322 46b87d0-46b87d4 1319->1322 1320->1319 1321->1322 1323 46b87c8 1321->1323 1324 46b87e6-46b87ed 1322->1324 1325 46b87d6-46b87dc 1322->1325 1323->1322 1326 46b87ef-46b87fe 1324->1326 1327 46b8804 1324->1327 1325->1324 1326->1327 1329 46b8805 1327->1329 1329->1329
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 046B86F6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: e819a655aff6d06add52f210394e7cbc091e0adcaddb89decff1d7d99b98bc92
                                  • Instruction ID: 91953a8e4451121f1644467389fca962f4c8c9b9ae94b6630e6421b2474847e9
                                  • Opcode Fuzzy Hash: e819a655aff6d06add52f210394e7cbc091e0adcaddb89decff1d7d99b98bc92
                                  • Instruction Fuzzy Hash: A5916B71D00219DFEB20DF69C8417DEBBB6BF48314F1485A9E848A7250EB74A9C5CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1330 c0ada8-c0adb7 1331 c0ade3-c0ade7 1330->1331 1332 c0adb9-c0adc6 call c0a0cc 1330->1332 1333 c0ade9-c0adf3 1331->1333 1334 c0adfb-c0ae3c 1331->1334 1337 c0adc8 1332->1337 1338 c0addc 1332->1338 1333->1334 1341 c0ae49-c0ae57 1334->1341 1342 c0ae3e-c0ae46 1334->1342 1385 c0adce call c0b040 1337->1385 1386 c0adce call c0b031 1337->1386 1338->1331 1344 c0ae59-c0ae5e 1341->1344 1345 c0ae7b-c0ae7d 1341->1345 1342->1341 1343 c0add4-c0add6 1343->1338 1349 c0af18-c0afd8 1343->1349 1346 c0ae60-c0ae67 call c0a0d8 1344->1346 1347 c0ae69 1344->1347 1348 c0ae80-c0ae87 1345->1348 1353 c0ae6b-c0ae79 1346->1353 1347->1353 1351 c0ae94-c0ae9b 1348->1351 1352 c0ae89-c0ae91 1348->1352 1380 c0afe0-c0b00b GetModuleHandleW 1349->1380 1381 c0afda-c0afdd 1349->1381 1356 c0aea8-c0aeaa call c0a0e8 1351->1356 1357 c0ae9d-c0aea5 1351->1357 1352->1351 1353->1348 1360 c0aeaf-c0aeb1 1356->1360 1357->1356 1361 c0aeb3-c0aebb 1360->1361 1362 c0aebe-c0aec3 1360->1362 1361->1362 1364 c0aee1-c0aeee 1362->1364 1365 c0aec5-c0aecc 1362->1365 1371 c0aef0-c0af0e 1364->1371 1372 c0af11-c0af17 1364->1372 1365->1364 1366 c0aece-c0aede call c0a0f8 call c0a108 1365->1366 1366->1364 1371->1372 1382 c0b014-c0b028 1380->1382 1383 c0b00d-c0b013 1380->1383 1381->1380 1383->1382 1385->1343 1386->1343
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00C0AFFE
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1723732793.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_c00000_workbook.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 0608b3e842e2aba96466bc5398ae7885cf667d0a1db0714bdd3795d18e250468
                                  • Instruction ID: f0b98f85becb0ca27a029aca4fe96502c4bb30fc5da6032fbd2aae8bd3fdc751
                                  • Opcode Fuzzy Hash: 0608b3e842e2aba96466bc5398ae7885cf667d0a1db0714bdd3795d18e250468
                                  • Instruction Fuzzy Hash: 30711470A00B058FDB24DF29D44575ABBF5FF88304F008A2DE49AD7A90D775E949CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1387 c0590c-c059d9 CreateActCtxA 1389 c059e2-c05a3c 1387->1389 1390 c059db-c059e1 1387->1390 1397 c05a4b-c05a4f 1389->1397 1398 c05a3e-c05a41 1389->1398 1390->1389 1399 c05a60 1397->1399 1400 c05a51-c05a5d 1397->1400 1398->1397 1401 c05a61 1399->1401 1400->1399 1401->1401
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00C059C9
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1723732793.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_c00000_workbook.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: fdf0a85355c3c2c040edb8a309e32eaa202e1a151b6397c18cc615bacfb2d65b
                                  • Instruction ID: 0f4b91c19390d9decbcb42a1480e0decf5fff2c73fe07a3f09db9ab496893602
                                  • Opcode Fuzzy Hash: fdf0a85355c3c2c040edb8a309e32eaa202e1a151b6397c18cc615bacfb2d65b
                                  • Instruction Fuzzy Hash: 3F41D4B0D0071DCFDB24CFA9C884B9EBBB5BF48304F24815AD408AB295DB755946CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1403 c044c4-c059d9 CreateActCtxA 1406 c059e2-c05a3c 1403->1406 1407 c059db-c059e1 1403->1407 1414 c05a4b-c05a4f 1406->1414 1415 c05a3e-c05a41 1406->1415 1407->1406 1416 c05a60 1414->1416 1417 c05a51-c05a5d 1414->1417 1415->1414 1418 c05a61 1416->1418 1417->1416 1418->1418
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00C059C9
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1723732793.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_c00000_workbook.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: e8714875028fb0dd1a43e071ec4b84ca4a5eee0c6756ab3244d369ceb66a3513
                                  • Instruction ID: 4d84a049409411d06385899c390c0eef0ef7fc1b2ae0d2dc38053e07df0e2453
                                  • Opcode Fuzzy Hash: e8714875028fb0dd1a43e071ec4b84ca4a5eee0c6756ab3244d369ceb66a3513
                                  • Instruction Fuzzy Hash: 7F41C4B0D0071DCFDB24DFA9C884B9EBBB5BF48304F24819AD408AB295DB756945CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1420 4c44040-4c4407c 1421 4c44082-4c44087 1420->1421 1422 4c4412c-4c4414c 1420->1422 1423 4c44089-4c440c0 1421->1423 1424 4c440da-4c44112 CallWindowProcW 1421->1424 1429 4c4414f-4c4415c 1422->1429 1430 4c440c2-4c440c8 1423->1430 1431 4c440c9-4c440d8 1423->1431 1425 4c44114-4c4411a 1424->1425 1426 4c4411b-4c4412a 1424->1426 1425->1426 1426->1429 1430->1431 1431->1429
                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 04C44101
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1740551494.0000000004C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c40000_workbook.jbxd
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: 494e78206e0d3f2c0fea694c95bd79ebd4f9cb70c5d6929b5d08e869764c9b7d
                                  • Instruction ID: 9547faa0e34afa25ea5553f4a1c933c69fc319a579c24bda9dacdde865d9003e
                                  • Opcode Fuzzy Hash: 494e78206e0d3f2c0fea694c95bd79ebd4f9cb70c5d6929b5d08e869764c9b7d
                                  • Instruction Fuzzy Hash: D8413AB8A00319DFDB14CF99C488B9ABBF5FB88314F24C459D519AB321D774A941CFA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1434 46b7e30-46b7e86 1436 46b7e88-46b7e94 1434->1436 1437 46b7e96-46b7ed5 WriteProcessMemory 1434->1437 1436->1437 1439 46b7ede-46b7f0e 1437->1439 1440 46b7ed7-46b7edd 1437->1440 1440->1439
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 046B7EC8
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: a5f843d283e9d5266d89378027ae77e5b45de2ec440acdb0439509fa788de1bd
                                  • Instruction ID: ef79acf714945698cceaa7459e3909447b105f28398b7b23992870ed226407a0
                                  • Opcode Fuzzy Hash: a5f843d283e9d5266d89378027ae77e5b45de2ec440acdb0439509fa788de1bd
                                  • Instruction Fuzzy Hash: CF2126B1900359DFCB10DFA9C985BDEBBF5FF88310F10882AE558A7250D7749954CBA4
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 046B7EC8
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: d1e93b5b949c22892f8a735c26ba32bb5e438f2e455d44da052395dc2b9635b8
                                  • Instruction ID: e926e06b2596704750ee6d130bb6de3d0e015d55af39ff4a9c91f669e5e7e92f
                                  • Opcode Fuzzy Hash: d1e93b5b949c22892f8a735c26ba32bb5e438f2e455d44da052395dc2b9635b8
                                  • Instruction Fuzzy Hash: 8D2139B1900359DFCB10CFA9C985BDEBBF5FF88310F10842AE959A7250D778A944CBA4
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00C0D656,?,?,?,?,?), ref: 00C0D717
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1723732793.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_c00000_workbook.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 62c66975f4aa2e150c40e539fe0e65932f43a54b5e76f379f0786113deabebeb
                                  • Instruction ID: 72c6ab05d78a32fbc5c7388c10a14d439ae2549fc0102a0c55691ca7139b4de8
                                  • Opcode Fuzzy Hash: 62c66975f4aa2e150c40e539fe0e65932f43a54b5e76f379f0786113deabebeb
                                  • Instruction Fuzzy Hash: 4B21E3B59002589FDB10CF9AD984AEEBBF8EB48310F14845AE959A7350D374A950CFA4
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 046B7D1E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 8c4ade829882d4358ab37050c8304b6211b3d279017525e12fb131d4a595d3a3
                                  • Instruction ID: 6970a291d6cc5c95fbf1de16107830abdb8af73eb8d56bf1ad43eb2e31a19c2a
                                  • Opcode Fuzzy Hash: 8c4ade829882d4358ab37050c8304b6211b3d279017525e12fb131d4a595d3a3
                                  • Instruction Fuzzy Hash: 36214CB1D003098FDB10DFA9C4857EEBBF4EF88324F14842AD459A7250DB78A685CF94
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 046B7FA8
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 307901a898ed406243c6991593fc4dc7686629a9557301553906480879ad3f6f
                                  • Instruction ID: 2d50064fe251005c9a9a526eaa10f062fe04b487262ec9d5a32290fd5c85db22
                                  • Opcode Fuzzy Hash: 307901a898ed406243c6991593fc4dc7686629a9557301553906480879ad3f6f
                                  • Instruction Fuzzy Hash: 6D2116B18003599FCB10DFA9C985AEEFBF5FF88320F10842AE558A7250D775A554CBA4
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 046B7D1E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 36a17c7c1cc1f43d21144748194cf66669602c10693b28de2962b3988870261a
                                  • Instruction ID: ab3b2ec05e6f65f6aa4c2ab787075a6d93f90556dcea33cf6fffc033436057d6
                                  • Opcode Fuzzy Hash: 36a17c7c1cc1f43d21144748194cf66669602c10693b28de2962b3988870261a
                                  • Instruction Fuzzy Hash: B1212CB1D003098FDB10DFAAC4857EEBBF4EF88324F14842AD459A7240D778A585CFA5
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 046B7FA8
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 4fa7d04a73625ba8b753065f4e49450a2fa3d88d816015f6adb427e623d00d08
                                  • Instruction ID: a508dd739e5a19d4a281d441a49d5f9a24d77d2fe22af89634d742042b6ba9d0
                                  • Opcode Fuzzy Hash: 4fa7d04a73625ba8b753065f4e49450a2fa3d88d816015f6adb427e623d00d08
                                  • Instruction Fuzzy Hash: 062139B1C003599FCB10DFAAC884ADEFBF5FF48320F10842AE558A7250D774A544CBA4
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00C0D656,?,?,?,?,?), ref: 00C0D717
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1723732793.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_c00000_workbook.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: f174b146f2b3536357790907b36777f02ed185e3c2135456048fa0a0705d5d62
                                  • Instruction ID: a8b6bc3d4fbb396e77b6e65fb93bad2c8ad6ee69a27697b808af4da1313f642c
                                  • Opcode Fuzzy Hash: f174b146f2b3536357790907b36777f02ed185e3c2135456048fa0a0705d5d62
                                  • Instruction Fuzzy Hash: 7621E4B5D00258DFDB10CF99D584ADEBBF5EB48324F14801AE915B7350C374A944CFA4
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C0B079,00000800,00000000,00000000), ref: 00C0B28A
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1723732793.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_c00000_workbook.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: a78a473d49fd79f91b7306397e255bf2aae4e6cdbafe6d05d37542651df81a4f
                                  • Instruction ID: a3d831360f287ef31cfa791fb56cf0e53de6ab9d777205ff92164e7834f911b2
                                  • Opcode Fuzzy Hash: a78a473d49fd79f91b7306397e255bf2aae4e6cdbafe6d05d37542651df81a4f
                                  • Instruction Fuzzy Hash: 211123B6D003099FDB20CF9AC448ADEFBF4EB88310F10842EE519A7250C375A944CFA8
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C0B079,00000800,00000000,00000000), ref: 00C0B28A
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1723732793.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_c00000_workbook.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 9cc6b4f5e53ca1db1c609c1b41e5232d18f3812d654da769f89f1141e66749fd
                                  • Instruction ID: a71f24bfe11c179c5331fd856a3145d702cbbb4b2ad6cd310ec966c559ad5321
                                  • Opcode Fuzzy Hash: 9cc6b4f5e53ca1db1c609c1b41e5232d18f3812d654da769f89f1141e66749fd
                                  • Instruction Fuzzy Hash: 931104B6D003499FDB14CFAAD484BDEFBF4EB48310F10852AD529AB250C375AA45CFA5
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 046B7DE6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 385ef3fbf245904f79433551019f4b059c89d18cd1d5ce7af549ce9958971800
                                  • Instruction ID: 6b069e6ca0e2f38d2248592cfad3599c8e46eeea792007999a564c986c2467eb
                                  • Opcode Fuzzy Hash: 385ef3fbf245904f79433551019f4b059c89d18cd1d5ce7af549ce9958971800
                                  • Instruction Fuzzy Hash: 161147719002498FCB10DFA9C844ADEBFF5EF88320F20841AE555AB250C775A550CF90
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 046B7DE6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 2d4c9e37891e5471d03a73c3670099c58eb65974f9c5af392e33107a789fda37
                                  • Instruction ID: dbf82db414d0516e3ac4dff1d4527cfb76a6fe38c74c72435aec0a4b8a0c4dcb
                                  • Opcode Fuzzy Hash: 2d4c9e37891e5471d03a73c3670099c58eb65974f9c5af392e33107a789fda37
                                  • Instruction Fuzzy Hash: 8B1137719002499FCB10DFAAC844BEFBFF5EF88320F20841AE559A7250CB75A554CFA4
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: a8a2f2c4be78e89a33acd98f22f4fb85d33545f214abd81b6dc8cddedaf0601d
                                  • Instruction ID: e35fa8fd8f391dcf7c839df22e3ca5d954246fdeafc98df1d96bb94e55296bbd
                                  • Opcode Fuzzy Hash: a8a2f2c4be78e89a33acd98f22f4fb85d33545f214abd81b6dc8cddedaf0601d
                                  • Instruction Fuzzy Hash: 6B1158B1D003588FCB20DFAAC4457DEFBF5EB88320F24882AD499A7250C775A944CF94
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 80da8f1edb53f2b3f0202cdd8a16f37aaf9d5a86ffb434e779cd3f64733c06e1
                                  • Instruction ID: 909f790c1139d7dcacc5b548e8e88653a76e45a23aa53968c410909059d72886
                                  • Opcode Fuzzy Hash: 80da8f1edb53f2b3f0202cdd8a16f37aaf9d5a86ffb434e779cd3f64733c06e1
                                  • Instruction Fuzzy Hash: CF113AB1D003588FDB20DFAAC4457DEFBF5EB88324F248429D459A7250CB75A544CF94
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00C0AFFE
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1723732793.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_c00000_workbook.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 96709c9e3c0d28d8b5513d95296e846e3d7b77a34b708af9b2f842a37eb517c1
                                  • Instruction ID: 916527c012490da7fdcb3cfb89a556a9d3fdabd81af0aa5e1ffa20bd40ccf095
                                  • Opcode Fuzzy Hash: 96709c9e3c0d28d8b5513d95296e846e3d7b77a34b708af9b2f842a37eb517c1
                                  • Instruction Fuzzy Hash: FF11E0B5C003498FCB14CF9AC444BDEFBF4AB88324F10846AD469A7250D375AA45CFA5
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 046BA8E5
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: b30314df9864d88259f507d6e905dd8cabe432ea0031f23384284a5d59b4530c
                                  • Instruction ID: 694c94e76d341807ac0850519a1a584e2ef1c1e2dc63fbb697c5f59bcf830649
                                  • Opcode Fuzzy Hash: b30314df9864d88259f507d6e905dd8cabe432ea0031f23384284a5d59b4530c
                                  • Instruction Fuzzy Hash: A91136B5800349DFDB10DF89C488BDEBBF8EB58310F108459E594A7610D375A980CFA5
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 046BA8E5
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1734934595.00000000046B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_46b0000_workbook.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: ab2f55418641f78a603cd98d75217fcab2701be36639ce43aa6bad4ff3c47b7f
                                  • Instruction ID: 8216e1c064604c9349b6939cb4a3450f2092d16248f80a284185c722c92f3714
                                  • Opcode Fuzzy Hash: ab2f55418641f78a603cd98d75217fcab2701be36639ce43aa6bad4ff3c47b7f
                                  • Instruction Fuzzy Hash: 071113B58043899FCB10DF99D488BDEFFF4EB48324F10885AE598A7611D375A580CFA1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1720467580.00000000008AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_8ad000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33fbb25acdc8d09bb221bdedf770769402147e820483240e18bff716913373cd
                                  • Instruction ID: 6cea2f03b92c0396fd39a4edd851a600174c21b2c7adfa95dc08c53fdedf8007
                                  • Opcode Fuzzy Hash: 33fbb25acdc8d09bb221bdedf770769402147e820483240e18bff716913373cd
                                  • Instruction Fuzzy Hash: 5521F1B1504304DFEB05DF14D9C4B2ABF65FB89314F20C569ED0A8BA56C336E816CBA1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1720467580.00000000008AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_8ad000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bdf366f8a23c67b78e27f0cc0c988dc684512abffdbf49d7be13322de3ae772d
                                  • Instruction ID: c6c39b2019b94594eae703b36fab0c33853899235a0244c8ca51a14d4fec8b70
                                  • Opcode Fuzzy Hash: bdf366f8a23c67b78e27f0cc0c988dc684512abffdbf49d7be13322de3ae772d
                                  • Instruction Fuzzy Hash: 78214571900304DFEB01DF14C9C0B2ABF65FB98318F20C569E80ACBA56C336D846CBA1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1720969716.00000000008BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008BD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_8bd000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: efea603cf42f962240e9c664c4a146ad3702f3a38a7de76965ff9b0d88646f7c
                                  • Instruction ID: ba27ec5adac3dd18061e9e9dfaa7b77c5302466964888864321ebf6a6cde9f2a
                                  • Opcode Fuzzy Hash: efea603cf42f962240e9c664c4a146ad3702f3a38a7de76965ff9b0d88646f7c
                                  • Instruction Fuzzy Hash: 6021F275604704EFCB14EF14D984B66BFA5FB88318F24C569D80A8B396D33AD847CA61
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1720969716.00000000008BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008BD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_8bd000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6ed5ec78d7394469822efca50f5650301bf5d3615f4ea0418483b2898694fa12
                                  • Instruction ID: 83161d054dab9d693766df2a68dd651cdfb0d279c5adfdbcb781591afe96ca19
                                  • Opcode Fuzzy Hash: 6ed5ec78d7394469822efca50f5650301bf5d3615f4ea0418483b2898694fa12
                                  • Instruction Fuzzy Hash: D52180755087809FCB02DF14D994B11BFB1FB46314F28C5EAD8498F2A7D33A981ACB62
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1720467580.00000000008AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_8ad000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d4a9c2a4520ad29cc5014b186a1537c42efb92585eeaa8902cc1b22a323ac8e1
                                  • Instruction ID: 8a6c16adef1a61510b2e9b2512375248e81b9f42075034f64b9a170101658b36
                                  • Opcode Fuzzy Hash: d4a9c2a4520ad29cc5014b186a1537c42efb92585eeaa8902cc1b22a323ac8e1
                                  • Instruction Fuzzy Hash: 7221CD76404240CFDB06CF00D9C4B16BF62FB84314F24C1A9DC498BA56C33AE82ACBA1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1720467580.00000000008AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_8ad000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                  • Instruction ID: 45a862e653c353fba749f527451182eef76dee8b02b9f00a1745abdb4641638b
                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                  • Instruction Fuzzy Hash: 9211D376904380CFDB16CF14D5C4B16BF71FB94318F24C6A9D84A8BA56C336D85ACBA1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1720467580.00000000008AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_8ad000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3018504ea1eb26928f75487af1da13ffc1f347500b7850a9d8c52f0d08f3d5c3
                                  • Instruction ID: 68a76965c174833c30cbe6463c950a07ff5061b268ce81e965bf680be10610b2
                                  • Opcode Fuzzy Hash: 3018504ea1eb26928f75487af1da13ffc1f347500b7850a9d8c52f0d08f3d5c3
                                  • Instruction Fuzzy Hash: 9701A7714093449AF7144A25CDC4767BF98FF42324F28C56AED1ACE996C679D840C6B1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.1720467580.00000000008AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_8ad000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b4bbcd3e58117ee9c13d185a1234e3a68d7e8ec1d2e8e2de93a9d033687e291
                                  • Instruction ID: 7b90608afa1160a0d15044bf8b98d5b94b50041b50d40f982fbff105b0773697
                                  • Opcode Fuzzy Hash: 0b4bbcd3e58117ee9c13d185a1234e3a68d7e8ec1d2e8e2de93a9d033687e291
                                  • Instruction Fuzzy Hash: DFF0C2714043449AE7148A16CCC8BA6FFA8EB91334F18C45AED098E686C2799844CA70

                                  Execution Graph

                                  Execution Coverage:9.9%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:208
                                  Total number of Limit Nodes:6
                                  execution_graph 24813 4f78b96 24814 4f78b25 24813->24814 24818 4f793c0 24813->24818 24823 4f79426 24813->24823 24829 4f793b0 24813->24829 24819 4f793c5 24818->24819 24834 4f796e9 24819->24834 24851 4f796f8 24819->24851 24820 4f793e2 24820->24814 24824 4f79429 24823->24824 24825 4f793b4 24823->24825 24824->24814 24827 4f796e9 12 API calls 24825->24827 24828 4f796f8 12 API calls 24825->24828 24826 4f793e2 24826->24814 24827->24826 24828->24826 24830 4f793b5 24829->24830 24832 4f796e9 12 API calls 24830->24832 24833 4f796f8 12 API calls 24830->24833 24831 4f793e2 24831->24814 24832->24831 24833->24831 24835 4f7970d 24834->24835 24836 4f7971f 24835->24836 24868 4f798b6 24835->24868 24876 4f799ab 24835->24876 24887 4f7a1ed 24835->24887 24892 4f7a14e 24835->24892 24900 4f7984f 24835->24900 24904 4f79b81 24835->24904 24908 4f79a63 24835->24908 24913 4f79964 24835->24913 24921 4f79ca6 24835->24921 24929 4f79e27 24835->24929 24937 4f79a58 24835->24937 24942 4f79dfb 24835->24942 24947 4f79cbb 24835->24947 24951 4f7993c 24835->24951 24836->24820 24852 4f7970d 24851->24852 24853 4f798b6 4 API calls 24852->24853 24854 4f7993c 4 API calls 24852->24854 24855 4f79cbb 2 API calls 24852->24855 24856 4f79dfb 2 API calls 24852->24856 24857 4f79a58 2 API calls 24852->24857 24858 4f79e27 4 API calls 24852->24858 24859 4f79ca6 4 API calls 24852->24859 24860 4f7971f 24852->24860 24861 4f79964 4 API calls 24852->24861 24862 4f79a63 2 API calls 24852->24862 24863 4f79b81 2 API calls 24852->24863 24864 4f7984f 2 API calls 24852->24864 24865 4f7a14e 4 API calls 24852->24865 24866 4f7a1ed 2 API calls 24852->24866 24867 4f799ab 6 API calls 24852->24867 24853->24860 24854->24860 24855->24860 24856->24860 24857->24860 24858->24860 24859->24860 24860->24820 24861->24860 24862->24860 24863->24860 24864->24860 24865->24860 24866->24860 24867->24860 24869 4f798d9 24868->24869 24870 4f79e12 24869->24870 24959 4f77ca0 24869->24959 24963 4f77c99 24869->24963 24967 4f777b0 24870->24967 24971 4f777b8 24870->24971 24871 4f7a21d 24877 4f799ce 24876->24877 24975 4f77e30 24877->24975 24979 4f77e38 24877->24979 24878 4f79940 24879 4f79e12 24878->24879 24885 4f77ca0 Wow64SetThreadContext 24878->24885 24886 4f77c99 Wow64SetThreadContext 24878->24886 24883 4f777b0 ResumeThread 24879->24883 24884 4f777b8 ResumeThread 24879->24884 24880 4f7a21d 24883->24880 24884->24880 24885->24878 24886->24878 24888 4f7a208 24887->24888 24890 4f777b0 ResumeThread 24888->24890 24891 4f777b8 ResumeThread 24888->24891 24889 4f7a21d 24890->24889 24891->24889 24893 4f79940 24892->24893 24894 4f79e12 24893->24894 24898 4f77ca0 Wow64SetThreadContext 24893->24898 24899 4f77c99 Wow64SetThreadContext 24893->24899 24896 4f777b0 ResumeThread 24894->24896 24897 4f777b8 ResumeThread 24894->24897 24895 4f7a21d 24896->24895 24897->24895 24898->24893 24899->24893 24983 4f784b4 24900->24983 24987 4f784c0 24900->24987 24991 4f77d70 24904->24991 24995 4f77d78 24904->24995 24905 4f79b9f 24909 4f79a70 24908->24909 24911 4f77e30 WriteProcessMemory 24909->24911 24912 4f77e38 WriteProcessMemory 24909->24912 24910 4f7a0d6 24911->24910 24912->24910 24914 4f79940 24913->24914 24915 4f79e12 24914->24915 24919 4f77ca0 Wow64SetThreadContext 24914->24919 24920 4f77c99 Wow64SetThreadContext 24914->24920 24917 4f777b0 ResumeThread 24915->24917 24918 4f777b8 ResumeThread 24915->24918 24916 4f7a21d 24917->24916 24918->24916 24919->24914 24920->24914 24922 4f798d9 24921->24922 24923 4f79e12 24922->24923 24925 4f77ca0 Wow64SetThreadContext 24922->24925 24926 4f77c99 Wow64SetThreadContext 24922->24926 24927 4f777b0 ResumeThread 24923->24927 24928 4f777b8 ResumeThread 24923->24928 24924 4f7a21d 24925->24922 24926->24922 24927->24924 24928->24924 24931 4f798aa 24929->24931 24930 4f7a21d 24931->24929 24932 4f79e12 24931->24932 24935 4f77ca0 Wow64SetThreadContext 24931->24935 24936 4f77c99 Wow64SetThreadContext 24931->24936 24933 4f777b0 ResumeThread 24932->24933 24934 4f777b8 ResumeThread 24932->24934 24933->24930 24934->24930 24935->24931 24936->24931 24938 4f79f6d 24937->24938 24999 4f77f20 24938->24999 25003 4f77f28 24938->25003 24939 4f79f10 24943 4f79e01 24942->24943 24945 4f777b0 ResumeThread 24943->24945 24946 4f777b8 ResumeThread 24943->24946 24944 4f7a21d 24945->24944 24946->24944 24949 4f77ca0 Wow64SetThreadContext 24947->24949 24950 4f77c99 Wow64SetThreadContext 24947->24950 24948 4f79cd5 24949->24948 24950->24948 24952 4f79940 24951->24952 24953 4f79e12 24952->24953 24957 4f77ca0 Wow64SetThreadContext 24952->24957 24958 4f77c99 Wow64SetThreadContext 24952->24958 24955 4f777b0 ResumeThread 24953->24955 24956 4f777b8 ResumeThread 24953->24956 24954 4f7a21d 24955->24954 24956->24954 24957->24952 24958->24952 24960 4f77ce5 Wow64SetThreadContext 24959->24960 24962 4f77d2d 24960->24962 24962->24869 24964 4f77ce5 Wow64SetThreadContext 24963->24964 24966 4f77d2d 24964->24966 24966->24869 24968 4f777b8 ResumeThread 24967->24968 24970 4f77829 24968->24970 24970->24871 24972 4f777f8 ResumeThread 24971->24972 24974 4f77829 24972->24974 24974->24871 24976 4f77e80 WriteProcessMemory 24975->24976 24978 4f77ed7 24976->24978 24978->24878 24980 4f77e80 WriteProcessMemory 24979->24980 24982 4f77ed7 24980->24982 24982->24878 24984 4f78549 CreateProcessA 24983->24984 24986 4f7870b 24984->24986 24988 4f78549 CreateProcessA 24987->24988 24990 4f7870b 24988->24990 24992 4f77db8 VirtualAllocEx 24991->24992 24994 4f77df5 24992->24994 24994->24905 24996 4f77db8 VirtualAllocEx 24995->24996 24998 4f77df5 24996->24998 24998->24905 25000 4f77f73 ReadProcessMemory 24999->25000 25002 4f77fb7 25000->25002 25002->24939 25004 4f77f73 ReadProcessMemory 25003->25004 25006 4f77fb7 25004->25006 25006->24939 25041 15e4668 25042 15e467a 25041->25042 25043 15e4686 25042->25043 25045 15e4779 25042->25045 25046 15e479d 25045->25046 25050 15e4888 25046->25050 25054 15e4879 25046->25054 25052 15e48af 25050->25052 25051 15e498c 25052->25051 25058 15e44c4 25052->25058 25055 15e48af 25054->25055 25056 15e498c 25055->25056 25057 15e44c4 CreateActCtxA 25055->25057 25057->25056 25059 15e5918 CreateActCtxA 25058->25059 25061 15e59db 25059->25061 25007 15ed690 DuplicateHandle 25008 15ed726 25007->25008 25009 15eacb0 25013 15eada8 25009->25013 25021 15ead97 25009->25021 25010 15eacbf 25014 15eadb9 25013->25014 25015 15eaddc 25013->25015 25014->25015 25029 15eb040 25014->25029 25033 15eb031 25014->25033 25015->25010 25016 15eadd4 25016->25015 25017 15eafe0 GetModuleHandleW 25016->25017 25018 15eb00d 25017->25018 25018->25010 25022 15eadb9 25021->25022 25023 15eaddc 25021->25023 25022->25023 25027 15eb040 LoadLibraryExW 25022->25027 25028 15eb031 LoadLibraryExW 25022->25028 25023->25010 25024 15eadd4 25024->25023 25025 15eafe0 GetModuleHandleW 25024->25025 25026 15eb00d 25025->25026 25026->25010 25027->25024 25028->25024 25030 15eb054 25029->25030 25031 15eb079 25030->25031 25037 15ea130 25030->25037 25031->25016 25034 15eb054 25033->25034 25035 15eb079 25034->25035 25036 15ea130 LoadLibraryExW 25034->25036 25035->25016 25036->25035 25039 15eb220 LoadLibraryExW 25037->25039 25040 15eb299 25039->25040 25040->25031 25062 15ed040 25063 15ed086 GetCurrentProcess 25062->25063 25065 15ed0d8 GetCurrentThread 25063->25065 25067 15ed0d1 25063->25067 25066 15ed115 GetCurrentProcess 25065->25066 25068 15ed10e 25065->25068 25071 15ed14b 25066->25071 25067->25065 25068->25066 25069 15ed173 GetCurrentThreadId 25070 15ed1a4 25069->25070 25071->25069 25072 4f7a708 25073 4f7a893 25072->25073 25074 4f7a72e 25072->25074 25074->25073 25076 4f780b0 25074->25076 25077 4f7a988 PostMessageW 25076->25077 25078 4f7a9f4 25077->25078 25078->25074

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 294 15ed031-15ed0cf GetCurrentProcess 298 15ed0d8-15ed10c GetCurrentThread 294->298 299 15ed0d1-15ed0d7 294->299 300 15ed10e-15ed114 298->300 301 15ed115-15ed149 GetCurrentProcess 298->301 299->298 300->301 303 15ed14b-15ed151 301->303 304 15ed152-15ed16d call 15ed618 301->304 303->304 307 15ed173-15ed1a2 GetCurrentThreadId 304->307 308 15ed1ab-15ed20d 307->308 309 15ed1a4-15ed1aa 307->309 309->308
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 015ED0BE
                                  • GetCurrentThread.KERNEL32 ref: 015ED0FB
                                  • GetCurrentProcess.KERNEL32 ref: 015ED138
                                  • GetCurrentThreadId.KERNEL32 ref: 015ED191
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 627edae134ac0cd792ff516599a393867518118030373e04e10ea6e11ea3d78d
                                  • Instruction ID: 162fda9f613d708053599e36482bd5c17c36da1656a4ac36715c358251e0fdaf
                                  • Opcode Fuzzy Hash: 627edae134ac0cd792ff516599a393867518118030373e04e10ea6e11ea3d78d
                                  • Instruction Fuzzy Hash: DE5144B09003498FDB58CFA9D948B9EBBF1BF88308F248459D559AB3A0D7359884CF65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 316 15ed040-15ed0cf GetCurrentProcess 320 15ed0d8-15ed10c GetCurrentThread 316->320 321 15ed0d1-15ed0d7 316->321 322 15ed10e-15ed114 320->322 323 15ed115-15ed149 GetCurrentProcess 320->323 321->320 322->323 325 15ed14b-15ed151 323->325 326 15ed152-15ed16d call 15ed618 323->326 325->326 329 15ed173-15ed1a2 GetCurrentThreadId 326->329 330 15ed1ab-15ed20d 329->330 331 15ed1a4-15ed1aa 329->331 331->330
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 015ED0BE
                                  • GetCurrentThread.KERNEL32 ref: 015ED0FB
                                  • GetCurrentProcess.KERNEL32 ref: 015ED138
                                  • GetCurrentThreadId.KERNEL32 ref: 015ED191
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: b68197fe1655758c7d102462d92c933429dc8bdfde89ef3337037aef6c4e2b0e
                                  • Instruction ID: 2e5c50fb77a2f7b037bcb954fca517c336b67559abe6739ac6b3087141dcb4ab
                                  • Opcode Fuzzy Hash: b68197fe1655758c7d102462d92c933429dc8bdfde89ef3337037aef6c4e2b0e
                                  • Instruction Fuzzy Hash: E35144B09003098FDB58DFAAD948B9EBBF1BF88314F20C419D459AB360D7349884CF65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 517 4f784b4-4f78555 519 4f78557-4f78561 517->519 520 4f7858e-4f785ae 517->520 519->520 521 4f78563-4f78565 519->521 527 4f785e7-4f78616 520->527 528 4f785b0-4f785ba 520->528 522 4f78567-4f78571 521->522 523 4f78588-4f7858b 521->523 525 4f78575-4f78584 522->525 526 4f78573 522->526 523->520 525->525 529 4f78586 525->529 526->525 534 4f7864f-4f78709 CreateProcessA 527->534 535 4f78618-4f78622 527->535 528->527 530 4f785bc-4f785be 528->530 529->523 532 4f785e1-4f785e4 530->532 533 4f785c0-4f785ca 530->533 532->527 536 4f785ce-4f785dd 533->536 537 4f785cc 533->537 548 4f78712-4f78798 534->548 549 4f7870b-4f78711 534->549 535->534 538 4f78624-4f78626 535->538 536->536 539 4f785df 536->539 537->536 540 4f78649-4f7864c 538->540 541 4f78628-4f78632 538->541 539->532 540->534 543 4f78636-4f78645 541->543 544 4f78634 541->544 543->543 545 4f78647 543->545 544->543 545->540 559 4f7879a-4f7879e 548->559 560 4f787a8-4f787ac 548->560 549->548 559->560 561 4f787a0 559->561 562 4f787ae-4f787b2 560->562 563 4f787bc-4f787c0 560->563 561->560 562->563 564 4f787b4 562->564 565 4f787c2-4f787c6 563->565 566 4f787d0-4f787d4 563->566 564->563 565->566 569 4f787c8 565->569 567 4f787e6-4f787ed 566->567 568 4f787d6-4f787dc 566->568 570 4f78804 567->570 571 4f787ef-4f787fe 567->571 568->567 569->566 573 4f78805 570->573 571->570 573->573
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04F786F6
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: d1c11cdf2336b6b1d570c1169c814392489e4ffbeca1f315a7e8f8f46a0023ca
                                  • Instruction ID: b20d9b0fe57eeaeeeadc71130cdc66fdc5c27a9488d032319b578f8a79621fd8
                                  • Opcode Fuzzy Hash: d1c11cdf2336b6b1d570c1169c814392489e4ffbeca1f315a7e8f8f46a0023ca
                                  • Instruction Fuzzy Hash: 56A18C71D00219DFDB10DF68C944BDDBBB2BF48354F1485AAE809A7290DB789986CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 574 4f784c0-4f78555 576 4f78557-4f78561 574->576 577 4f7858e-4f785ae 574->577 576->577 578 4f78563-4f78565 576->578 584 4f785e7-4f78616 577->584 585 4f785b0-4f785ba 577->585 579 4f78567-4f78571 578->579 580 4f78588-4f7858b 578->580 582 4f78575-4f78584 579->582 583 4f78573 579->583 580->577 582->582 586 4f78586 582->586 583->582 591 4f7864f-4f78709 CreateProcessA 584->591 592 4f78618-4f78622 584->592 585->584 587 4f785bc-4f785be 585->587 586->580 589 4f785e1-4f785e4 587->589 590 4f785c0-4f785ca 587->590 589->584 593 4f785ce-4f785dd 590->593 594 4f785cc 590->594 605 4f78712-4f78798 591->605 606 4f7870b-4f78711 591->606 592->591 595 4f78624-4f78626 592->595 593->593 596 4f785df 593->596 594->593 597 4f78649-4f7864c 595->597 598 4f78628-4f78632 595->598 596->589 597->591 600 4f78636-4f78645 598->600 601 4f78634 598->601 600->600 602 4f78647 600->602 601->600 602->597 616 4f7879a-4f7879e 605->616 617 4f787a8-4f787ac 605->617 606->605 616->617 618 4f787a0 616->618 619 4f787ae-4f787b2 617->619 620 4f787bc-4f787c0 617->620 618->617 619->620 621 4f787b4 619->621 622 4f787c2-4f787c6 620->622 623 4f787d0-4f787d4 620->623 621->620 622->623 626 4f787c8 622->626 624 4f787e6-4f787ed 623->624 625 4f787d6-4f787dc 623->625 627 4f78804 624->627 628 4f787ef-4f787fe 624->628 625->624 626->623 630 4f78805 627->630 628->627 630->630
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04F786F6
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: d42db966b457496124942384702e0eaf203fd89686d3dce0168de0c4befdc3fe
                                  • Instruction ID: 72088399323be3bdd58f56282374922f1382b14a6a43b3f5a7cf51fa2f0c4fe1
                                  • Opcode Fuzzy Hash: d42db966b457496124942384702e0eaf203fd89686d3dce0168de0c4befdc3fe
                                  • Instruction Fuzzy Hash: 40918D71D00219DFDB20DF68CC44BDDBBB2BF48354F0485AAE809A7250DB78A986CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 631 15eada8-15eadb7 632 15eadb9-15eadc6 call 15ea0cc 631->632 633 15eade3-15eade7 631->633 638 15eaddc 632->638 639 15eadc8 632->639 635 15eadfb-15eae3c 633->635 636 15eade9-15eadf3 633->636 642 15eae3e-15eae46 635->642 643 15eae49-15eae57 635->643 636->635 638->633 686 15eadce call 15eb040 639->686 687 15eadce call 15eb031 639->687 642->643 644 15eae7b-15eae7d 643->644 645 15eae59-15eae5e 643->645 647 15eae80-15eae87 644->647 648 15eae69 645->648 649 15eae60-15eae67 call 15ea0d8 645->649 646 15eadd4-15eadd6 646->638 650 15eaf18-15eafd8 646->650 652 15eae89-15eae91 647->652 653 15eae94-15eae9b 647->653 654 15eae6b-15eae79 648->654 649->654 681 15eafda-15eafdd 650->681 682 15eafe0-15eb00b GetModuleHandleW 650->682 652->653 657 15eae9d-15eaea5 653->657 658 15eaea8-15eaeaa call 15ea0e8 653->658 654->647 657->658 661 15eaeaf-15eaeb1 658->661 662 15eaebe-15eaec3 661->662 663 15eaeb3-15eaebb 661->663 665 15eaec5-15eaecc 662->665 666 15eaee1-15eaeee 662->666 663->662 665->666 667 15eaece-15eaede call 15ea0f8 call 15ea108 665->667 672 15eaef0-15eaf0e 666->672 673 15eaf11-15eaf17 666->673 667->666 672->673 681->682 683 15eb00d-15eb013 682->683 684 15eb014-15eb028 682->684 683->684 686->646 687->646
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 015EAFFE
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: dffc0a242325e3919f508d1c77d0f234ae0ea3826226cc0ba1b9f36cb564e842
                                  • Instruction ID: 3b95f4a43de4645bdf0f5c13c40629a1cfd60090c1e1fa71a4183bcd13d98607
                                  • Opcode Fuzzy Hash: dffc0a242325e3919f508d1c77d0f234ae0ea3826226cc0ba1b9f36cb564e842
                                  • Instruction Fuzzy Hash: E0712370A00B058FD768DF39C55875ABBF1FF88204F008A2ED59ADBA50D775E849CB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 688 15e44c4-15e59d9 CreateActCtxA 691 15e59db-15e59e1 688->691 692 15e59e2-15e5a3c 688->692 691->692 699 15e5a3e-15e5a41 692->699 700 15e5a4b-15e5a4f 692->700 699->700 701 15e5a60 700->701 702 15e5a51-15e5a5d 700->702 703 15e5a61 701->703 702->701 703->703
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 015E59C9
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 0ee7675c46c147fd83ddbcc343b33cf391eac54f61f9737cd8cb6844c2e591ae
                                  • Instruction ID: d414ef3d019905a336f2137f8b36b843d70a36bad61920caf2ab6d222c8d2ee4
                                  • Opcode Fuzzy Hash: 0ee7675c46c147fd83ddbcc343b33cf391eac54f61f9737cd8cb6844c2e591ae
                                  • Instruction Fuzzy Hash: 7D41D2B4C10719CBDB24CFA9C94468EBBF6BF49304F24806AD409AB255EB755945CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 705 15e590c-15e59d9 CreateActCtxA 707 15e59db-15e59e1 705->707 708 15e59e2-15e5a3c 705->708 707->708 715 15e5a3e-15e5a41 708->715 716 15e5a4b-15e5a4f 708->716 715->716 717 15e5a60 716->717 718 15e5a51-15e5a5d 716->718 719 15e5a61 717->719 718->717 719->719
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 015E59C9
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 3925b0fcf9c38dc5110eae7b0ea55f165613fe1de2ee791883fd54882f60b5f1
                                  • Instruction ID: 926eaa9531edce046eae0657168c3c9e2ce3b7ce3410233880fe0bffa124fa63
                                  • Opcode Fuzzy Hash: 3925b0fcf9c38dc5110eae7b0ea55f165613fe1de2ee791883fd54882f60b5f1
                                  • Instruction Fuzzy Hash: EA41D2B0C10719CBDB28CFA9C9847CDBBF6BF49304F24806AD409AB255EB756945CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 721 4f77e30-4f77e86 723 4f77e96-4f77ed5 WriteProcessMemory 721->723 724 4f77e88-4f77e94 721->724 726 4f77ed7-4f77edd 723->726 727 4f77ede-4f77f0e 723->727 724->723 726->727
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04F77EC8
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 766e4be97c91eb62f998541381083ad82ca852b67b99b16d0d7bafc1e837e914
                                  • Instruction ID: d2a3ba9db61083f86a86c77933651d99ab4e969e3408805c01109101fa925adc
                                  • Opcode Fuzzy Hash: 766e4be97c91eb62f998541381083ad82ca852b67b99b16d0d7bafc1e837e914
                                  • Instruction Fuzzy Hash: 4C2137B5900349CFDB10DFA9C9817DEBBF1FF48310F10882AD958A7250D778A945CB55

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 731 4f77e38-4f77e86 733 4f77e96-4f77ed5 WriteProcessMemory 731->733 734 4f77e88-4f77e94 731->734 736 4f77ed7-4f77edd 733->736 737 4f77ede-4f77f0e 733->737 734->733 736->737
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04F77EC8
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 304810e09849df3acb793bc9be33aea01f97219d8418eb09f128f11d00b4c42c
                                  • Instruction ID: c80714b81e95342ab7879521df1ab20db2460b85665abf512beda44b7bc89e02
                                  • Opcode Fuzzy Hash: 304810e09849df3acb793bc9be33aea01f97219d8418eb09f128f11d00b4c42c
                                  • Instruction Fuzzy Hash: 2A2157B1900309DFCB10DFA9C984BDEBBF5FF48310F10882AE958A7250D778A944CBA1
                                  APIs
                                  • Wow64SetThreadContext.KERNELBASE(?,00000000), ref: 04F77D1E
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 854f24a0b4b58d01e09ece5c3786f9671a037d509fd2582d71431b08ec29c78a
                                  • Instruction ID: 51af145db3e3b0c76e06d582904a40784ac142c2e4048cde084d2604fc6a1c85
                                  • Opcode Fuzzy Hash: 854f24a0b4b58d01e09ece5c3786f9671a037d509fd2582d71431b08ec29c78a
                                  • Instruction Fuzzy Hash: CE2134B19002098FDB10DFAAC4857EEBBF4EF48324F10842AD459A7240DB78A945CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 741 4f77c99-4f77ceb 743 4f77ced-4f77cf9 741->743 744 4f77cfb-4f77d2b Wow64SetThreadContext 741->744 743->744 746 4f77d34-4f77d64 744->746 747 4f77d2d-4f77d33 744->747 747->746
                                  APIs
                                  • Wow64SetThreadContext.KERNELBASE(?,00000000), ref: 04F77D1E
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 23741be1213b5e9abff18701a197720f1fa673852317d1fc269780647ba4e920
                                  • Instruction ID: 215389629b5f779ceac3391a8865665d859f7da0f006772bfe01f22c5dc3c2db
                                  • Opcode Fuzzy Hash: 23741be1213b5e9abff18701a197720f1fa673852317d1fc269780647ba4e920
                                  • Instruction Fuzzy Hash: 852135B1D003098FDB14DFA9C5857EEBBF1AF48324F14C42AD599A7240CB78AA45CF95
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04F77FA8
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: aca057a0632bd1cff7bf380d26d251524e8a04b64e85091f73efc75a0cc85ac3
                                  • Instruction ID: 5cdb77f9598ff27727b2d35225a7549427680cfb1b37c35fba3286779777cbb2
                                  • Opcode Fuzzy Hash: aca057a0632bd1cff7bf380d26d251524e8a04b64e85091f73efc75a0cc85ac3
                                  • Instruction Fuzzy Hash: 852145B1900349CFDB10CFA9C5417DEBBF1FF48320F14842AE998A7250DB39A541DBA5
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04F77FA8
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: e4082e30dd2e3fe02f8955d573861bc9fc1f4e5e78b555b7af0f285d2f2d86f0
                                  • Instruction ID: 2e4ba5eb9a4962de2635dcf983e429942c05c2a331f9b3117853b85d2614ad1a
                                  • Opcode Fuzzy Hash: e4082e30dd2e3fe02f8955d573861bc9fc1f4e5e78b555b7af0f285d2f2d86f0
                                  • Instruction Fuzzy Hash: 302128B18003599FDB10DFAAC944ADEFBF5FF48320F10842AE558A7250D738A544CBA5
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015ED717
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 9e6ce997bb515759b7909feafaedd6a41f8f10bcf02fb319ed7a49e5539bc385
                                  • Instruction ID: 67745b7ab8318a553eb0342022590ded16ae4c0e2ff4175b5d9c97666ebb6712
                                  • Opcode Fuzzy Hash: 9e6ce997bb515759b7909feafaedd6a41f8f10bcf02fb319ed7a49e5539bc385
                                  • Instruction Fuzzy Hash: E421E2B5D002489FDB10CFAAD984ADEBFF8FB48320F14841AE958A7350D374A940CFA5
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015ED717
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 5f46b485d91f7ebd39baabc204de2ac5e232ea24814c50b009127b838942e1bf
                                  • Instruction ID: f0293f62ad86938ff18c5a3c45a9ba53481e0611ede93c69f6441a7942f815c3
                                  • Opcode Fuzzy Hash: 5f46b485d91f7ebd39baabc204de2ac5e232ea24814c50b009127b838942e1bf
                                  • Instruction Fuzzy Hash: 7C21E0B5D002599FDB10CFA9D984ADEBBF4FB48314F14841AE958B7350D374A940CFA5
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015EB079,00000800,00000000,00000000), ref: 015EB28A
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 32a54cbae2d228b02240ce50f70098f2c7f96d829a890a5c2a7e6f6e0fbc0c77
                                  • Instruction ID: 1a4947fee87e0f10d2a9ceafe5d4019a4c08ccf8a87c820f88f7f1078e184727
                                  • Opcode Fuzzy Hash: 32a54cbae2d228b02240ce50f70098f2c7f96d829a890a5c2a7e6f6e0fbc0c77
                                  • Instruction Fuzzy Hash: 5311E4B6D002099FDB14CF9AD448ADEFBF4FF48310F10842AD559AB210C775A545CFA5
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015EB079,00000800,00000000,00000000), ref: 015EB28A
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 592f42bd0fa4a7cebd7c86f33168cdf9712e5c414ca9cf145d69c7cd22283f83
                                  • Instruction ID: 734545997afc22b59eb91cff3defe099abce6b01a16dc0d1b816ebf84a7bbac7
                                  • Opcode Fuzzy Hash: 592f42bd0fa4a7cebd7c86f33168cdf9712e5c414ca9cf145d69c7cd22283f83
                                  • Instruction Fuzzy Hash: 0911D3B6D003498FDB14CF9AC448ADEFBF4EB48310F14842AD559AB610D375A545CFA5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: c99c8f074c9b7b4ef7543ffe2163729da6a46dc85e619fa42e839c8d6a31a55f
                                  • Instruction ID: eee67c3d30a4978dd5668ad838225bed9536e9c54f159246975ca8cc496dfeee
                                  • Opcode Fuzzy Hash: c99c8f074c9b7b4ef7543ffe2163729da6a46dc85e619fa42e839c8d6a31a55f
                                  • Instruction Fuzzy Hash: 6D115BB1D003588FDB20DFAAC4457DEFBF9EB48324F24882AD459A7250CA38A945CF95
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04F77DE6
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 3531ed03f3c849a8fe4b4d87f016533ab5adff73bb49540b107f4dbaaaa7e876
                                  • Instruction ID: bcede9b514c7e90a47fe63a77082621f846792eb0162c37eb655523352f8098c
                                  • Opcode Fuzzy Hash: 3531ed03f3c849a8fe4b4d87f016533ab5adff73bb49540b107f4dbaaaa7e876
                                  • Instruction Fuzzy Hash: D21156769002498FDB10DFA9C8447EEBFF2EF48320F20881AD559A7250CB79A955CF91
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04F77DE6
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 87bee5679035c21206829b6dc8f0b638e17290b9c45044a476caa4fcd8bc9ac4
                                  • Instruction ID: eedecd0371a92638ad255ae55b93ecafcb0d973518768e73c2293bf8a0bdf41c
                                  • Opcode Fuzzy Hash: 87bee5679035c21206829b6dc8f0b638e17290b9c45044a476caa4fcd8bc9ac4
                                  • Instruction Fuzzy Hash: 711137719002499FDB10DFAAC844BEFBFF5EF48320F10881AE559A7250CB75A554CFA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 49931b7354f1901ed05364e7079346c3d13aa18201be3d62f2dc3586acd8c415
                                  • Instruction ID: ac3082397dd506e0ed1d448e01c946fc8bdb0f0c33f0f611596ebd046a893d23
                                  • Opcode Fuzzy Hash: 49931b7354f1901ed05364e7079346c3d13aa18201be3d62f2dc3586acd8c415
                                  • Instruction Fuzzy Hash: B21128B1D003488BDB20DFAAC4457DEFBF5EB88324F24882AD559A7250CA79A544CB95
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 04F7A9E5
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 3fcd3f5bb59369997a59937e2a5a0ac19dc7cc50f8818226f6ff6cdf1303fc01
                                  • Instruction ID: fedd451397cd7383958d2740da6958e9858d014633be061e92ec981bbb684019
                                  • Opcode Fuzzy Hash: 3fcd3f5bb59369997a59937e2a5a0ac19dc7cc50f8818226f6ff6cdf1303fc01
                                  • Instruction Fuzzy Hash: 291113B58043499FDB10CF99C484BDEBFF4EB49320F11845AD558A7251C379A944CFA2
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 015EAFFE
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1770275245.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_15e0000_workbook.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: dfd57c0b99fc10fb290eca275c09561329015ae110b1c37b5d516e87f6501e15
                                  • Instruction ID: aa252ac8d6125e21e0748ec2da7adee1f10e7c60f088f993be9b93051f9ce353
                                  • Opcode Fuzzy Hash: dfd57c0b99fc10fb290eca275c09561329015ae110b1c37b5d516e87f6501e15
                                  • Instruction Fuzzy Hash: 5B11E0B5C003498FDB24CF9AC448ADEFBF4EF88324F10842AD569A7250D375A545CFA5
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 04F7A9E5
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1810926185.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f70000_workbook.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: afb9e6ddd8135e4352e3477f108242defc61a6ce8b4b01d6a46906fa33834dd3
                                  • Instruction ID: cfdfe57c3a378ab35ad396ea1b6e5b1815b00935975ab07cc7ae4f6abd025b94
                                  • Opcode Fuzzy Hash: afb9e6ddd8135e4352e3477f108242defc61a6ce8b4b01d6a46906fa33834dd3
                                  • Instruction Fuzzy Hash: E41136B5800348DFDB10CF9AC444BDEFBF8EB48310F10841AE554A7201D374A950CFA1
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1769772568.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_13fd000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4bdbd0c6c9f471e1f55818bae8d4bf88e9ff09236bb0de0a390181032dd1d3f
                                  • Instruction ID: 7a323bf48154467ff22919d66745460eb246cf17eb0d37858e57c3e3ec47028c
                                  • Opcode Fuzzy Hash: e4bdbd0c6c9f471e1f55818bae8d4bf88e9ff09236bb0de0a390181032dd1d3f
                                  • Instruction Fuzzy Hash: 282122B1500244DFDB05DF98D9C8B2ABF65FB8831CF20C56DEA090B256C336D456CAA2
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1769849422.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140d000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1b9682fbbe968578683641b32cb2e5d4c7d2a05dcf7b8732b6a7e65888ca9a5b
                                  • Instruction ID: 195b856a8d88b1b1b101f9578e65b575c75f3cf59f1d5e5b6653e5870caae001
                                  • Opcode Fuzzy Hash: 1b9682fbbe968578683641b32cb2e5d4c7d2a05dcf7b8732b6a7e65888ca9a5b
                                  • Instruction Fuzzy Hash: A02128B1904200DFDB16DF99D984B16BF65EB84318F20C57ED90D4B3A6C336D44BCA61
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1769849422.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140d000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eb0a08b72e9b64bcb21d0a79627bdb4df172ae673d5f1307c5b4ce13efb13ad7
                                  • Instruction ID: c2cb4fee91bd4a8da893cdcbc8ed7b7e604de18a409aeae0f9d10a11c3a8236d
                                  • Opcode Fuzzy Hash: eb0a08b72e9b64bcb21d0a79627bdb4df172ae673d5f1307c5b4ce13efb13ad7
                                  • Instruction Fuzzy Hash: 8B2195755093808FD703CF64D594716BF71EB46214F28C5EBD8498F6A7C33A980ACB62
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1769772568.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_13fd000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                  • Instruction ID: 728065e0bb3785e43b24ce11c18a480aea4d6e9e7488e675d23f96e93524315f
                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                  • Instruction Fuzzy Hash: DA11E172404280CFCB02CF54D5C8B16BF71FB84318F24C6ADD9090B256C336D45ACBA2
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1769772568.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_13fd000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ddc95a5b3c6b6be6df9d3a20a176e401d8167df574a92017a736db7f6a6aef53
                                  • Instruction ID: 953f2a77155be35d574b17b61b4fd919542a90b916ac8ae15ce6f019d20a1343
                                  • Opcode Fuzzy Hash: ddc95a5b3c6b6be6df9d3a20a176e401d8167df574a92017a736db7f6a6aef53
                                  • Instruction Fuzzy Hash: 9E01A7710093849AE7119EA9CE88767BFDCEF41328F18C52DEE094E196D2799844C672
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.1769772568.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_13fd000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c0f1d51b100a4c9274715c3cf305f9666fc7218379f2d3dc126eb88b83215d51
                                  • Instruction ID: 2e839aed4eaa55d855075d61d94bfd60f384c6cfaea85b559872be618efad974
                                  • Opcode Fuzzy Hash: c0f1d51b100a4c9274715c3cf305f9666fc7218379f2d3dc126eb88b83215d51
                                  • Instruction Fuzzy Hash: 3AF068714053849AE7118E59C988766FFE8EF81738F18C55AED084E296C2759844CA71

                                  Execution Graph

                                  Execution Coverage:10%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:123
                                  Total number of Limit Nodes:12
                                  execution_graph 24149 33c4668 24150 33c4676 24149->24150 24155 33c6de0 24150->24155 24153 33c4704 24156 33c6e05 24155->24156 24164 33c6edf 24156->24164 24168 33c6ef0 24156->24168 24157 33c46e9 24160 33c421c 24157->24160 24161 33c4227 24160->24161 24176 33c8560 24161->24176 24163 33c8806 24163->24153 24166 33c6f17 24164->24166 24165 33c6ff4 24165->24165 24166->24165 24172 33c6414 24166->24172 24170 33c6f17 24168->24170 24169 33c6ff4 24169->24169 24170->24169 24171 33c6414 CreateActCtxA 24170->24171 24171->24169 24173 33c7370 CreateActCtxA 24172->24173 24175 33c7433 24173->24175 24177 33c856b 24176->24177 24179 33c88dd 24177->24179 24180 33c8580 24177->24180 24179->24163 24181 33c858b 24180->24181 24184 33c85b0 24181->24184 24183 33c89ba 24183->24179 24185 33c85bb 24184->24185 24188 33c85e0 24185->24188 24187 33c8aad 24187->24183 24189 33c85eb 24188->24189 24191 33c9e93 24189->24191 24195 33cbed1 24189->24195 24190 33c9ed1 24190->24187 24191->24190 24201 33cdf70 24191->24201 24206 33cdf60 24191->24206 24196 33cbeda 24195->24196 24197 33cbe91 24195->24197 24211 33cbf08 24196->24211 24215 33cbef8 24196->24215 24197->24191 24198 33cbee6 24198->24191 24202 33cdf91 24201->24202 24203 33cdfb5 24202->24203 24258 33ce120 24202->24258 24262 33ce110 24202->24262 24203->24190 24207 33cdf91 24206->24207 24208 33cdfb5 24207->24208 24209 33ce120 6 API calls 24207->24209 24210 33ce110 6 API calls 24207->24210 24208->24190 24209->24208 24210->24208 24219 33cc000 24211->24219 24229 33cbff0 24211->24229 24212 33cbf17 24212->24198 24216 33cbf17 24215->24216 24217 33cc000 3 API calls 24215->24217 24218 33cbff0 3 API calls 24215->24218 24216->24198 24217->24216 24218->24216 24220 33cc011 24219->24220 24223 33cc034 24219->24223 24239 33caf60 24220->24239 24223->24212 24224 33cc02c 24224->24223 24225 33cc238 GetModuleHandleW 24224->24225 24226 33cc265 24225->24226 24226->24212 24230 33cc034 24229->24230 24231 33cc011 24229->24231 24230->24212 24232 33caf60 GetModuleHandleW 24231->24232 24233 33cc01c 24232->24233 24233->24230 24237 33cc698 2 API calls 24233->24237 24238 33cc689 2 API calls 24233->24238 24234 33cc238 GetModuleHandleW 24236 33cc265 24234->24236 24235 33cc02c 24235->24230 24235->24234 24236->24212 24237->24235 24238->24235 24240 33cc1f0 GetModuleHandleW 24239->24240 24242 33cc01c 24240->24242 24242->24223 24243 33cc698 24242->24243 24248 33cc689 24242->24248 24244 33caf60 GetModuleHandleW 24243->24244 24245 33cc6ac 24244->24245 24246 33cc6d1 24245->24246 24254 33cc294 24245->24254 24246->24224 24249 33cc698 24248->24249 24250 33caf60 GetModuleHandleW 24249->24250 24251 33cc6ac 24250->24251 24252 33cc6d1 24251->24252 24253 33cc294 LoadLibraryExW 24251->24253 24252->24224 24253->24252 24255 33cc878 LoadLibraryExW 24254->24255 24257 33cc8f1 24255->24257 24257->24246 24260 33ce12d 24258->24260 24259 33ce166 24259->24203 24260->24259 24266 33cc464 24260->24266 24263 33ce120 24262->24263 24264 33ce166 24263->24264 24265 33cc464 6 API calls 24263->24265 24264->24203 24265->24264 24267 33cc46f 24266->24267 24269 33ce1d8 24267->24269 24270 33cc498 24267->24270 24269->24269 24271 33cc4a3 24270->24271 24272 33c85e0 6 API calls 24271->24272 24273 33ce247 24272->24273 24274 33ce256 24273->24274 24277 33ce2c0 24273->24277 24281 33ce2b0 24273->24281 24274->24269 24278 33ce2ee 24277->24278 24279 33ce3ba KiUserCallbackDispatcher 24278->24279 24280 33ce3bf 24278->24280 24279->24280 24280->24280 24282 33ce2ee 24281->24282 24283 33ce3ba KiUserCallbackDispatcher 24282->24283 24284 33ce3bf 24282->24284 24283->24284 24285 33c6540 24286 33c6586 24285->24286 24291 33c670f 24286->24291 24296 33c6780 24286->24296 24303 33c6720 24286->24303 24287 33c6673 24292 33c6713 24291->24292 24295 33c66b9 24291->24295 24306 33c611c 24292->24306 24295->24287 24297 33c6783 DuplicateHandle 24296->24297 24299 33c6729 24296->24299 24302 33c681e 24297->24302 24300 33c674e 24299->24300 24301 33c611c DuplicateHandle 24299->24301 24300->24287 24301->24300 24302->24287 24304 33c611c DuplicateHandle 24303->24304 24305 33c674e 24304->24305 24305->24287 24307 33c6788 DuplicateHandle 24306->24307 24308 33c674e 24307->24308 24308->24287
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (oq$(oq
                                  • API String ID: 0-3207256227
                                  • Opcode ID: 32b85f721b7f0b4a4e2659b90d9e67d5aef4d06180196f0ae6003503e7aa9727
                                  • Instruction ID: 39825d5a8a8f71c1a4491968176676a937bb64f7b494949083f3d320c6a6561b
                                  • Opcode Fuzzy Hash: 32b85f721b7f0b4a4e2659b90d9e67d5aef4d06180196f0ae6003503e7aa9727
                                  • Instruction Fuzzy Hash: A682BD75A00605CFCB15EF69C49462EBBF6FF84321F14856EE556AB391DB30E842CB82

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 272 85828a0-85828b0 274 85829c9-85829ee 272->274 275 85828b6-85828ba 272->275 277 85829f5-8582a1a 274->277 276 85828c0-85828c9 275->276 275->277 279 85828cf-85828f6 276->279 280 8582a21-8582a57 276->280 277->280 289 85828fc-85828fe 279->289 290 85829be-85829c8 279->290 296 8582a5e-8582abd 280->296 292 858291f-8582921 289->292 293 8582900-8582903 289->293 297 8582924-8582928 292->297 295 8582909-8582913 293->295 293->296 295->296 298 8582919-858291d 295->298 313 8582abf-8582ac4 296->313 314 8582ae1-8582af8 296->314 300 8582989-8582995 297->300 301 858292a-8582939 297->301 298->292 298->297 300->296 302 858299b-85829b8 300->302 301->296 306 858293f-8582986 301->306 302->289 302->290 306->300 372 8582ac7 call 8582d78 313->372 373 8582ac7 call 8582d88 313->373 323 8582be8-8582bf8 314->323 324 8582afe-8582be3 call 85819d0 call 8580dc8 314->324 316 8582acd-8582ad3 374 8582ad6 call 8582e38 316->374 375 8582ad6 call 8582e28 316->375 376 8582ad6 call 8582fc8 316->376 377 8582ad6 call 8583098 316->377 378 8582ad6 call 85830a8 316->378 319 8582adc 322 8582d0a-8582d15 319->322 330 8582d44-8582d65 322->330 331 8582d17-8582d27 322->331 328 8582bfe-8582cd7 call 85819d0 323->328 329 8582ce5-8582d01 323->329 324->323 369 8582cd9 328->369 370 8582ce2 328->370 329->322 339 8582d29-8582d2f 331->339 340 8582d37-8582d3d 331->340 339->340 340->330 369->370 370->329 372->316 373->316 374->319 375->319 376->319 377->319 378->319
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (oq$(oq$Hoq
                                  • API String ID: 0-3836682603
                                  • Opcode ID: f70d758ad1494a51b91bf797eac9f63864c0430e62508bbd3070a34ddad6312b
                                  • Instruction ID: b96181220054d3e64643e2e37567ac7e710e189cc4c732114015b30500133a75
                                  • Opcode Fuzzy Hash: f70d758ad1494a51b91bf797eac9f63864c0430e62508bbd3070a34ddad6312b
                                  • Instruction Fuzzy Hash: 65E16334A00609DFCB44EFA4D5949ADBBB2FF88300F518569E415AB364DF34ED86CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 646 8587920-85879c1 656 85879ca-8587a0c 646->656 657 85879c3-85879c8 646->657 658 8587a0f-8587a19 656->658 657->658 659 8587a1f-8587b0d call 8580a20 * 2 call 8580dc8 * 2 call 8580a20 call 8580dc8 658->659 660 8587b15-8587bfa call 8580788 * 2 658->660 659->660 707 8587bfc-8587c31 660->707 708 8587c3e-8587ca9 call 8580788 660->708 707->708 720 8587c33-8587c36 707->720 723 8587cab 708->723 724 8587cb4 708->724 720->708 723->724 725 8587cb5 724->725 725->725
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'kq$4'kq
                                  • API String ID: 0-4171853269
                                  • Opcode ID: 37b872fad35c4c730aec654f85c88707dc5b13db5153096a9d4c0c0239d4bacc
                                  • Instruction ID: b66bccb597a7d6529b2717503bcf88512c742645897604a4b1fc7a36c7e9db31
                                  • Opcode Fuzzy Hash: 37b872fad35c4c730aec654f85c88707dc5b13db5153096a9d4c0c0239d4bacc
                                  • Instruction Fuzzy Hash: D4C1C474B00618CFDB44EFA8C994AADB7B6FF88300F504569E506AB3A5DB71EC42CB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 726 8587912-858791e 727 8587920-8587924 726->727 728 8587925-85879c1 726->728 727->728 737 85879ca-8587a0c 728->737 738 85879c3-85879c8 728->738 739 8587a0f-8587a19 737->739 738->739 740 8587a1f-8587b0d call 8580a20 * 2 call 8580dc8 * 2 call 8580a20 call 8580dc8 739->740 741 8587b15-8587bfa call 8580788 * 2 739->741 740->741 788 8587bfc-8587c31 741->788 789 8587c3e-8587ca9 call 8580788 741->789 788->789 801 8587c33-8587c36 788->801 804 8587cab 789->804 805 8587cb4 789->805 801->789 804->805 806 8587cb5 805->806 806->806
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'kq$4'kq
                                  • API String ID: 0-4171853269
                                  • Opcode ID: b39009d9c47912faa1a7cb50054d122c9a75ca53d7fcd82a4d421a356aa373d7
                                  • Instruction ID: 7dd15ae2f550b62f2a23780e284398b2c97e7ee016055223f909ded1c89f45a6
                                  • Opcode Fuzzy Hash: b39009d9c47912faa1a7cb50054d122c9a75ca53d7fcd82a4d421a356aa373d7
                                  • Instruction Fuzzy Hash: E5C1D874B00618CFCB44EFA4C994AADB7B6BF89301F504569E506AB3A5DB71EC42CB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 807 85873e8-8587411 810 8587413 807->810 811 8587417-858741d 807->811 810->811 812 858741f 811->812 813 8587423-8587429 811->813 812->813 814 858742b 813->814 815 858742f-8587435 813->815 814->815 816 858743c-8587440 815->816 817 8587437-858743a 815->817 818 8587446-8587449 816->818 819 8587534-8587558 816->819 817->816 817->818 820 858744b-858744e 818->820 821 8587455-858745c 818->821 828 858755f-8587583 819->828 820->821 822 8587450-8587453 820->822 823 8587463-8587467 821->823 822->821 825 858745e-8587460 822->825 826 8587469-858746b 823->826 827 8587474-858747c 823->827 825->823 826->828 829 8587471 826->829 830 858747e 827->830 831 8587482-8587490 827->831 836 858758a-85875af 828->836 829->827 830->831 831->836 837 8587496-85874a2 831->837 842 85875b6-85875ec 836->842 841 85874a8-85874c7 837->841 837->842 852 85874c9-85874d9 841->852 853 858752a-8587531 841->853 856 85875f3-858764e 842->856 857 85874e1-85874ef 852->857 872 8587650 856->872 873 8587655 856->873 861 8587518-8587524 857->861 862 85874f1-8587501 857->862 861->853 861->856 862->861 866 8587503-8587512 862->866 866->861 870 8587514 866->870 870->861 872->873
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (oq$Hoq
                                  • API String ID: 0-3084834809
                                  • Opcode ID: 88c861d75e5ea85f9982cfefe2c8d0259adb99224b0b96d534977767f24f4ae1
                                  • Instruction ID: 2c88c9a4bec9c5a4effa441cea085e55c5ea1d50c078c7ba5b6e3ebebb21bef1
                                  • Opcode Fuzzy Hash: 88c861d75e5ea85f9982cfefe2c8d0259adb99224b0b96d534977767f24f4ae1
                                  • Instruction Fuzzy Hash: 7061F1347002558FDB28FF3AC41462E7BE6BF89201B24456ED556DB3A1EF38DD068B91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 874 8587238-858724d 877 858724f-858725f 874->877 878 85872b1-85872ee 874->878 881 8587298-85872b0 877->881 882 8587261-858726d 877->882 891 85872f0-85872f4 878->891 892 85872f5-8587313 878->892 886 858728e-8587297 882->886 887 858726f-858728d 882->887 891->892 893 858738f-85873be 892->893 894 8587315-8587338 892->894 902 85873c0 call 85873e8 893->902 903 85873c0 call 85873da 893->903 894->893 898 858733a-858738c 894->898 899 85873c6-85873cf 902->899 903->899
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (oq$,oq
                                  • API String ID: 0-616274613
                                  • Opcode ID: c983a816e1747a1e128161e8d7a47cf0134113dc929f89fa72214c57b21d70b8
                                  • Instruction ID: 0b60f94e3955eb2d6ecc9434b0318de30cfaa2146753d2b2400b6fd89e2419e7
                                  • Opcode Fuzzy Hash: c983a816e1747a1e128161e8d7a47cf0134113dc929f89fa72214c57b21d70b8
                                  • Instruction Fuzzy Hash: C041E3367001596F8F119EAA9C509FFBFEEEB8C211B14406BFA45E3281DA39C91597A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 904 33cc000-33cc00f 905 33cc03b-33cc03f 904->905 906 33cc011-33cc01e call 33caf60 904->906 907 33cc041-33cc04b 905->907 908 33cc053-33cc094 905->908 913 33cc034 906->913 914 33cc020 906->914 907->908 915 33cc096-33cc09e 908->915 916 33cc0a1-33cc0af 908->916 913->905 959 33cc026 call 33cc698 914->959 960 33cc026 call 33cc689 914->960 915->916 917 33cc0b1-33cc0b6 916->917 918 33cc0d3-33cc0d5 916->918 921 33cc0b8-33cc0bf call 33caf6c 917->921 922 33cc0c1 917->922 920 33cc0d8-33cc0df 918->920 919 33cc02c-33cc02e 919->913 923 33cc170-33cc230 919->923 924 33cc0ec-33cc0f3 920->924 925 33cc0e1-33cc0e9 920->925 927 33cc0c3-33cc0d1 921->927 922->927 954 33cc238-33cc263 GetModuleHandleW 923->954 955 33cc232-33cc235 923->955 928 33cc0f5-33cc0fd 924->928 929 33cc100-33cc109 call 33caf7c 924->929 925->924 927->920 928->929 935 33cc10b-33cc113 929->935 936 33cc116-33cc11b 929->936 935->936 937 33cc11d-33cc124 936->937 938 33cc139-33cc146 936->938 937->938 940 33cc126-33cc136 call 33caf8c call 33caf9c 937->940 944 33cc148-33cc166 938->944 945 33cc169-33cc16f 938->945 940->938 944->945 956 33cc26c-33cc280 954->956 957 33cc265-33cc26b 954->957 955->954 957->956 959->919 960->919
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4126284343.00000000033C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_33c0000_workbook.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 02d976e18feec6ded1c136d8b43daafe060859b5b77da2430582e0f042bde909
                                  • Instruction ID: 4677213800b2fa2e1d7dc0bad90e17a8b74bc001bd701b810672c93374bafa25
                                  • Opcode Fuzzy Hash: 02d976e18feec6ded1c136d8b43daafe060859b5b77da2430582e0f042bde909
                                  • Instruction Fuzzy Hash: 247148B4A10B458FD724DF6AD88075ABBF5FF48600F048A2DD48ADBB50D775E84ACB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 961 33c6780-33c6781 962 33c6729-33c672b 961->962 963 33c6783-33c681c DuplicateHandle 961->963 965 33c672d-33c672f 962->965 966 33c6731-33c6733 962->966 967 33c681e-33c6824 963->967 968 33c6825-33c6842 963->968 965->966 969 33c6739-33c673b 966->969 970 33c6735-33c6737 966->970 967->968 971 33c673d-33c673f 969->971 972 33c6741-33c6747 969->972 970->969 971->972 973 33c674e-33c6774 972->973 974 33c6749 call 33c611c 972->974 974->973
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,033C674E,?,?,?,?,?), ref: 033C680F
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4126284343.00000000033C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_33c0000_workbook.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: cb438f6e6dc11df55b35e100783143ec50909eb3070b2da03983e74938cb793c
                                  • Instruction ID: cdfa0695e87dc1d371efa02cf544d6b3e54ee6c01ff009358b52bcc62e44d5a9
                                  • Opcode Fuzzy Hash: cb438f6e6dc11df55b35e100783143ec50909eb3070b2da03983e74938cb793c
                                  • Instruction Fuzzy Hash: 6C3148B5900249EFCF00CFA9D885ADEBFF5EB88310F188019E954A7361D735A954DFA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 979 33c6414-33c7431 CreateActCtxA 982 33c743a-33c7494 979->982 983 33c7433-33c7439 979->983 990 33c7496-33c7499 982->990 991 33c74a3-33c74a7 982->991 983->982 990->991 992 33c74b8 991->992 993 33c74a9-33c74b5 991->993 995 33c74b9 992->995 993->992 995->995
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 033C7421
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4126284343.00000000033C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_33c0000_workbook.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 976eb55ea0909b2c40a70b18650e22b5ce8ac0ca78094478a8c32b77b004df65
                                  • Instruction ID: 37811b19aeae92d81d9ffdd62ab7711aa90a1cd95e0d94135220d1febecc0c08
                                  • Opcode Fuzzy Hash: 976eb55ea0909b2c40a70b18650e22b5ce8ac0ca78094478a8c32b77b004df65
                                  • Instruction Fuzzy Hash: B841C3B0D0061DCFDB24DFA9C984BDDBBB5BF48304F24805AD418AB255EB756985CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 996 33c7364-33c736b 997 33c7370-33c7431 CreateActCtxA 996->997 999 33c743a-33c7494 997->999 1000 33c7433-33c7439 997->1000 1007 33c7496-33c7499 999->1007 1008 33c74a3-33c74a7 999->1008 1000->999 1007->1008 1009 33c74b8 1008->1009 1010 33c74a9-33c74b5 1008->1010 1012 33c74b9 1009->1012 1010->1009 1012->1012
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 033C7421
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4126284343.00000000033C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_33c0000_workbook.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 0202a390813f7d01a38e541890ebf771a9c8e57036003911178e13ab763a91b5
                                  • Instruction ID: b9e68398cbc2e6af7fb6ad62c4b3e164d8a3b98f1c6efcb270a142d4cee1f37d
                                  • Opcode Fuzzy Hash: 0202a390813f7d01a38e541890ebf771a9c8e57036003911178e13ab763a91b5
                                  • Instruction Fuzzy Hash: C441D1B1C0061DCFDB24CFA9C884BCEBBB5BF48304F24806AD458AB255EB756985CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1013 33c611c-33c681c DuplicateHandle 1015 33c681e-33c6824 1013->1015 1016 33c6825-33c6842 1013->1016 1015->1016
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,033C674E,?,?,?,?,?), ref: 033C680F
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4126284343.00000000033C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_33c0000_workbook.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 62d9be9293ea55a7e8f814d27cddffad5158b681e3d60d6d0c653da4ea78373a
                                  • Instruction ID: 2bfec04e9b3b444f40f3417133b06f6e1df3c2f9fe92af8cfcb0ee81d4777ade
                                  • Opcode Fuzzy Hash: 62d9be9293ea55a7e8f814d27cddffad5158b681e3d60d6d0c653da4ea78373a
                                  • Instruction Fuzzy Hash: 0421E3B59002489FDB10CF9AD984ADEBBF8FB48320F14841AE958A7350D375A944CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1019 8586680-8586701 1028 858670a-8586718 1019->1028 1029 8586703-8586708 1019->1029 1030 858671b-8586796 call 8582fc8 1028->1030 1029->1030 1114 8586799 call 8586b48 1030->1114 1115 8586799 call 8586b38 1030->1115 1116 8586799 call 8586b14 1030->1116 1040 858679f-85867a6 1041 85867a8-85867ad 1040->1041 1042 85867af-85867ec 1040->1042 1043 85867ef-858685c 1041->1043 1042->1043 1055 858696d-85869cb call 8580788 call 8580950 call 8580788 1043->1055 1056 8586862-858696b call 85863c8 call 8580788 call 8580950 call 8586360 call 85819d0 call 8580a20 1043->1056 1078 85869d2-85869fa 1055->1078 1079 85869cd call 8580a20 1055->1079 1056->1078 1086 85869fc-8586a34 1078->1086 1087 8586a36-8586a5b 1078->1087 1079->1078 1086->1087 1094 8586a5d 1087->1094 1095 8586a66-8586a95 1087->1095 1094->1095 1102 8586a53-8586a64 1095->1102 1103 8586a97-8586aa3 1095->1103 1102->1095 1108 8586aa4 1103->1108 1108->1108 1114->1040 1115->1040 1116->1040
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Plkq
                                  • API String ID: 0-177148220
                                  • Opcode ID: 18149fda263e8aa9b6524661397f00ca75b64f7939185d83b4f2158b22075598
                                  • Instruction ID: 97761356d952052bc1a3fb18d080017820ec6f5df66310ea3093b560720fdf79
                                  • Opcode Fuzzy Hash: 18149fda263e8aa9b6524661397f00ca75b64f7939185d83b4f2158b22075598
                                  • Instruction Fuzzy Hash: 6FD1ED38B11218DFCB44EFA4D994E9EBBB6BF88700F108459E505AB3A5CB75EC46CB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1117 33cc294-33cc8b8 1119 33cc8ba-33cc8bd 1117->1119 1120 33cc8c0-33cc8ef LoadLibraryExW 1117->1120 1119->1120 1121 33cc8f8-33cc915 1120->1121 1122 33cc8f1-33cc8f7 1120->1122 1122->1121
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,033CC6D1,00000800,00000000,00000000), ref: 033CC8E2
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4126284343.00000000033C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_33c0000_workbook.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 938074301e28bf5d821c6b239eb69dea818b859a1b3423c8ffbb11a29006e3ca
                                  • Instruction ID: fe35068250a14861f2954195187174d569c3b8f3f4549149de9cef2188d7ed67
                                  • Opcode Fuzzy Hash: 938074301e28bf5d821c6b239eb69dea818b859a1b3423c8ffbb11a29006e3ca
                                  • Instruction Fuzzy Hash: F411D0B69003499FDB10DF9AD884A9EFBF4FB88310F14842EE519A7610C375A945CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1125 33cc870-33cc8b8 1126 33cc8ba-33cc8bd 1125->1126 1127 33cc8c0-33cc8ef LoadLibraryExW 1125->1127 1126->1127 1128 33cc8f8-33cc915 1127->1128 1129 33cc8f1-33cc8f7 1127->1129 1129->1128
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,033CC6D1,00000800,00000000,00000000), ref: 033CC8E2
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4126284343.00000000033C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_33c0000_workbook.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 37eb4dba9842cc1bc86c4984db03d1c42fe789ad9971d752040ba519ceceea1c
                                  • Instruction ID: d5f8d94695009e279266df46cd105388f2a45d0fcc1f261b306ab6706bc7ab5c
                                  • Opcode Fuzzy Hash: 37eb4dba9842cc1bc86c4984db03d1c42fe789ad9971d752040ba519ceceea1c
                                  • Instruction Fuzzy Hash: A611E2BAD003498FDB10CF9AD984ADEFBF4BB48310F14842ED559A7610C379A945CFA5
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,033CC01C), ref: 033CC256
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4126284343.00000000033C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_33c0000_workbook.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 1a47189e900ef5439f7adf9e06f21596ce68bac80718d9f520a05f3f1b6da273
                                  • Instruction ID: 6da12d26601f8887f56b7d94ec0191c804d401be01728bcf04d7aec815285b7e
                                  • Opcode Fuzzy Hash: 1a47189e900ef5439f7adf9e06f21596ce68bac80718d9f520a05f3f1b6da273
                                  • Instruction Fuzzy Hash: 871102B5C002498FCB10DF9AC884ADEFBF4EB88214F14842AD429B7210D379A946CFA5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (oq
                                  • API String ID: 0-3175707579
                                  • Opcode ID: 7122715daee2a29172c6df109368bf062f6627820a53cfe3cd78bf15c2d4c996
                                  • Instruction ID: 00f25a9557656c8e968c2b96b2251a681409f3f9b2f0d8837b6c41aa581e87ce
                                  • Opcode Fuzzy Hash: 7122715daee2a29172c6df109368bf062f6627820a53cfe3cd78bf15c2d4c996
                                  • Instruction Fuzzy Hash: 50A1C235304200DFC719AF64D994A2A7BA3FF89311F1584AAE5059F3B6CB36EC46DB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Plkq
                                  • API String ID: 0-177148220
                                  • Opcode ID: 679daca9266797318c0726d8868591a0ce9b9e9454d008eeff75bae0ff03c134
                                  • Instruction ID: b4c2fbd38f0a01d52ef58f52180d47c6b196c7d8a5db7faea1a766514c9404d9
                                  • Opcode Fuzzy Hash: 679daca9266797318c0726d8868591a0ce9b9e9454d008eeff75bae0ff03c134
                                  • Instruction Fuzzy Hash: 9EB13D34B11318DFCB44EFA8D994E9EBBB6BF88700F144459E502AB3A5CA75EC46CB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Hoq
                                  • API String ID: 0-3049094369
                                  • Opcode ID: bd707da0b92228f7d28b48a5e3b3e92b5c9c68f5fbbab801e14b14d1ee9db6a6
                                  • Instruction ID: c37a4d34221002796827dfb483982bf9de3d8366a9e88c0e6363ba0cb07e4a33
                                  • Opcode Fuzzy Hash: bd707da0b92228f7d28b48a5e3b3e92b5c9c68f5fbbab801e14b14d1ee9db6a6
                                  • Instruction Fuzzy Hash: DE518034B006158FC744EF69C95496EBBB6FF89701B1081AAE505DB361EF30ED46CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'kq
                                  • API String ID: 0-3255046985
                                  • Opcode ID: 02e710576dd217fd38c5270abdf048e5af3755eba2ac0c518bd3ac0d53a6d6c9
                                  • Instruction ID: 0eb1e35ade71e57c7f429d33c1a11ac055660335ddc252d83b70349bd3c8f0fa
                                  • Opcode Fuzzy Hash: 02e710576dd217fd38c5270abdf048e5af3755eba2ac0c518bd3ac0d53a6d6c9
                                  • Instruction Fuzzy Hash: 84513A30B487D49FD716B7288CA46AE7FA6AFC6701F15409BD181EF2D2CEA44C46C792
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'kq
                                  • API String ID: 0-3255046985
                                  • Opcode ID: 9638e2ce0846b1283289c49289f245d291662fff35e1fa31563c232a2d6b4bb3
                                  • Instruction ID: e5e2eef8b8f91cd63fbc22b32ee76e0d411ffdae8433745b524d0dd79489bd69
                                  • Opcode Fuzzy Hash: 9638e2ce0846b1283289c49289f245d291662fff35e1fa31563c232a2d6b4bb3
                                  • Instruction Fuzzy Hash: 80419334B107148FCB44BB64C8A4AADB7BBBFC9700F50541AD112AB394DFB4AC46DB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'kq
                                  • API String ID: 0-3255046985
                                  • Opcode ID: 8c9ca49976dfa8a34e2bfa9e7235c5fb4ef1cf8ce76a45c14137043a271eb7ea
                                  • Instruction ID: 55971c9e3a2e83f39752cf1d61d29176b5ab221ff04b493aebb522046da0f292
                                  • Opcode Fuzzy Hash: 8c9ca49976dfa8a34e2bfa9e7235c5fb4ef1cf8ce76a45c14137043a271eb7ea
                                  • Instruction Fuzzy Hash: 74416D353406009FD318EB29C954F2A7BAAAFC8B05F1044A9E2069F3A5DE75EC42C791
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'kq
                                  • API String ID: 0-3255046985
                                  • Opcode ID: fc366523070985b0a2e47a702198655fe82ed3d3e66c9d2b081cba61e478b4fd
                                  • Instruction ID: 82ffaf5b261333dc6529d3056907e54be0784210c28d7d1b19b3eb607d908149
                                  • Opcode Fuzzy Hash: fc366523070985b0a2e47a702198655fe82ed3d3e66c9d2b081cba61e478b4fd
                                  • Instruction Fuzzy Hash: 9D314A357406149FD358EB29C994B2B77AABFC8B04F104468E2068F3A5DE76EC42CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (oq
                                  • API String ID: 0-3175707579
                                  • Opcode ID: 42c9206debe76c9c804ad1dccb68793816b9f1a52099a035742611f449584740
                                  • Instruction ID: 20066d125314fa3356b4919701204f3232e4cd49178ac056703aceb6594ff7a8
                                  • Opcode Fuzzy Hash: 42c9206debe76c9c804ad1dccb68793816b9f1a52099a035742611f449584740
                                  • Instruction Fuzzy Hash: FD014725319794CBD7467729442023F6FAAAFC2501B1580BBD441DB3C1DE789C068396
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: xoq
                                  • API String ID: 0-2982640460
                                  • Opcode ID: c4d7abc0033833e1770f4220878516563a9835a95542b852bbe7ef2c6c4d9821
                                  • Instruction ID: 0b0f3a47633646ae4e7f7247c9eb1d087aee58b9079117455a0d1e6dd99ee020
                                  • Opcode Fuzzy Hash: c4d7abc0033833e1770f4220878516563a9835a95542b852bbe7ef2c6c4d9821
                                  • Instruction Fuzzy Hash: 89F0E5387001109FDB04DB18D941A69BBF5FF88314F158099E109AF361D771FC068F50
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce7806616fc2ff6a5ccf84f858a17fb28570cac3612d2a6438d0489f99e8f5fb
                                  • Instruction ID: ae287e1c15e3ad3e6c1e383b0a210513224758bf26fcdb9e1225f4390b975c6e
                                  • Opcode Fuzzy Hash: ce7806616fc2ff6a5ccf84f858a17fb28570cac3612d2a6438d0489f99e8f5fb
                                  • Instruction Fuzzy Hash: C2120934A00219CFCB54EF64C894A9DBBB2BF89301F5095A9D54AAB355DF30ED85CF50
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 57bf68320e1d8d2416ed21c8c51631444d9d70d5fcfcec2dec5fd384e931b092
                                  • Instruction ID: 279970d303dac9c3349a19d3eaaceb10ca50a01308fe66f7bd357302306ab2bf
                                  • Opcode Fuzzy Hash: 57bf68320e1d8d2416ed21c8c51631444d9d70d5fcfcec2dec5fd384e931b092
                                  • Instruction Fuzzy Hash: 9BA16B34700704CFCB45EB68C4A496E7BB6BF89701B508599E4029F3A4DF35EC469B91
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 08f6432ed6f0f05eb67687e5a6129fdd469169eceb8f5ba75319a1423de65115
                                  • Instruction ID: cd3523a525e43b1c21d5ca52d02f77fe8158eb3d4dad0c5321b5e919fe0c10d4
                                  • Opcode Fuzzy Hash: 08f6432ed6f0f05eb67687e5a6129fdd469169eceb8f5ba75319a1423de65115
                                  • Instruction Fuzzy Hash: E0A15A347007048FCB44EF68C4A4A6E7BB6BFC9700B508559E512AF3A4EF35ED469B91
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3f783fdee5c0baca4bcb97e6a18ab068b6aabc1a9bfe463d895d8c99411fc8c2
                                  • Instruction ID: b023bb8ce1121029c5bb07b427ed8e3f9141d0f7e408fe51bfd24b2d5d91ad41
                                  • Opcode Fuzzy Hash: 3f783fdee5c0baca4bcb97e6a18ab068b6aabc1a9bfe463d895d8c99411fc8c2
                                  • Instruction Fuzzy Hash: 7AA159347007048FCB44EF68C8A4A6E7BB6BFC8700B508559E506AF3A4EF74ED469B91
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80677f633509229ce2c3cf844e1a8321d039f8dae3f0f49bde78d5f179e0224d
                                  • Instruction ID: 3235b867ce5a4b4370fe56bb936bd50f8e3672f5f1c262df62ce020247e8daa3
                                  • Opcode Fuzzy Hash: 80677f633509229ce2c3cf844e1a8321d039f8dae3f0f49bde78d5f179e0224d
                                  • Instruction Fuzzy Hash: 13912E34710614CFDB44EF64D894AADBBB6BF89611F1480A9E506EB3A5CF74EC42CB90
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9336936980e971b4e09a001ef83110c54b4261c60d3d19c12decf8edbfffb11b
                                  • Instruction ID: 0ee0737786db353fad76df085d2d9f6e675f58b3446c203d121c0b2fb2936052
                                  • Opcode Fuzzy Hash: 9336936980e971b4e09a001ef83110c54b4261c60d3d19c12decf8edbfffb11b
                                  • Instruction Fuzzy Hash: FC816D34B01705DFDB48EB64D494BAEB7B2BF88701F108569D402AB3A4DF75AD86CB90
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f52bbd5f5239bef51b37e94b93143f5f88dd7c61c84fe96f608bfb9ac9bfa6a
                                  • Instruction ID: e0547b220e0c7f4edc5f77f28278e0ffa31b2cf36cbbff8d43f0248b4824c2b6
                                  • Opcode Fuzzy Hash: 6f52bbd5f5239bef51b37e94b93143f5f88dd7c61c84fe96f608bfb9ac9bfa6a
                                  • Instruction Fuzzy Hash: 1A81F574A21228EFCB15DF98D980EADB7B2FF88310F15455AE505AB362E771EC81CB41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dcf15874039fbf74efb8cd0e66f13913f3e5ef65d78a511e23a38a76d78b5cd8
                                  • Instruction ID: 0767a39de23021d91280360c69afff156ac8bcdef7f7f01425305076834f8ff2
                                  • Opcode Fuzzy Hash: dcf15874039fbf74efb8cd0e66f13913f3e5ef65d78a511e23a38a76d78b5cd8
                                  • Instruction Fuzzy Hash: 80612A34710604DFCB44EF68D894AADB7B6BF88611F1481A9E506AB3A5DF70EC42CB90
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5f0a5ad1963f6506fdbe58482a75eaeaab601b000edec0cc35580be77a0dc4ae
                                  • Instruction ID: d75a4d1d0c0d35a6a67a461667285db99771d3f686593c65db5b1e97acf8687a
                                  • Opcode Fuzzy Hash: 5f0a5ad1963f6506fdbe58482a75eaeaab601b000edec0cc35580be77a0dc4ae
                                  • Instruction Fuzzy Hash: 24518034B01705DFDB09EF64D494BAEBBB2BF88301F14856AD4026B390DB75AD86CB91
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1cb75db51c7d9602c70cf3c5797e2b9e55c468eb9763e5518d0136aa223c8e3c
                                  • Instruction ID: c523320d702ae0ca2b1b2d29d980f18026b2d1af5b600b80c9e5c693b7e72559
                                  • Opcode Fuzzy Hash: 1cb75db51c7d9602c70cf3c5797e2b9e55c468eb9763e5518d0136aa223c8e3c
                                  • Instruction Fuzzy Hash: 5E41E231B01704CFCB64EB78D55029EBBF5FF84661F54896EC15ADBA84EA30E841CB82
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6526cd834f732e87d061e8c3b1deb9be10719de92c160016929331cd5130d584
                                  • Instruction ID: f8550b7f112ce5cc8b159fa8826825c8d2b7ed441304d859e0428edcf16ab800
                                  • Opcode Fuzzy Hash: 6526cd834f732e87d061e8c3b1deb9be10719de92c160016929331cd5130d584
                                  • Instruction Fuzzy Hash: B541A235B006149FC745EB69C850A9EBBF6FFC8310B2585AAE509EB365DB71EC41CB80
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e49b406a116dd812e69b7275f49d79c402abdf639c96b4f579ced710e548e94
                                  • Instruction ID: c53db946c6cb996b56883f947fc9bb3328b9017b8a3448e250a18426fe0fdfeb
                                  • Opcode Fuzzy Hash: 5e49b406a116dd812e69b7275f49d79c402abdf639c96b4f579ced710e548e94
                                  • Instruction Fuzzy Hash: 5F41E430200345CFDB24EF3AC84466A7FF5BF89216F24856EE8959B2A1EB70D945CB91
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb19fa6fa2556a46d9856ba096757606274be7f8691e95cb4a62caa52907294b
                                  • Instruction ID: f8ec869693ec24283ff9e4443742cea6c57fe1b2a6769987f66f7d3673d3ef40
                                  • Opcode Fuzzy Hash: bb19fa6fa2556a46d9856ba096757606274be7f8691e95cb4a62caa52907294b
                                  • Instruction Fuzzy Hash: 6E319034B107088FCB44EF28C89456E7BBAAFC9600B10855AD402DB365EF70AD46CBD2
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4c433b22dc377623220c8aa7defcae1384d04b78bab3c52b98f68658849a535
                                  • Instruction ID: 00aa08bc89ba941e0735a58715d891f354d9f5212fdd69ba27727e610f1be091
                                  • Opcode Fuzzy Hash: c4c433b22dc377623220c8aa7defcae1384d04b78bab3c52b98f68658849a535
                                  • Instruction Fuzzy Hash: 25312D35A00219DBDF04EFA4D954AEEB7B6FF88712F108029D811B73A4CB35AD05CBA0
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c4131c6425133c8aba32aa4bdfb871d03f26a4c17d83d324c804147f49ffb4b
                                  • Instruction ID: dcba6e797ef8ad31fc5d834546ef1a3c39c4929973f477b64f0b301d3e33bf59
                                  • Opcode Fuzzy Hash: 3c4131c6425133c8aba32aa4bdfb871d03f26a4c17d83d324c804147f49ffb4b
                                  • Instruction Fuzzy Hash: E4317E34B107188FCB44EF64C894A6EB7BAAFC8700F10855AD5029B354DF70AD46CBD1
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b970cff8e3440ee283916e1a87c52e7bc52d4fca7ae8b43e75c8071c0b9c2ae
                                  • Instruction ID: 7867dd18ebc9164efd44af6f8c43c1dda7f0e42953d9b10e0c675e25a2ee1f01
                                  • Opcode Fuzzy Hash: 7b970cff8e3440ee283916e1a87c52e7bc52d4fca7ae8b43e75c8071c0b9c2ae
                                  • Instruction Fuzzy Hash: F0217F35A10218DFCB169FA9C4549DE7FB6FB8D321F14412AE415BB390DA319841CFA1
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4125932447.000000000329D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0329D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_329d000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 673c5a06d13b18133ab127c4554cd61b163f9d3110703ea309b7bb0427078369
                                  • Instruction ID: 25d604d1843115c06b08c0f900ec3fe417dbe9eabd90ad681f3fd12c66b3d42b
                                  • Opcode Fuzzy Hash: 673c5a06d13b18133ab127c4554cd61b163f9d3110703ea309b7bb0427078369
                                  • Instruction Fuzzy Hash: FC212271614200DFEF14DF24D984B26BBA5FB84314F24C5AED80A4B256C37BD487DA61
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd3adafe318b5970d5071625c1629194270129d47557111c0ea1156a1f02d0cd
                                  • Instruction ID: 34df6a0e0602c625f3d094cd735c5991616690888b6e3fac36cce4e0706023c5
                                  • Opcode Fuzzy Hash: dd3adafe318b5970d5071625c1629194270129d47557111c0ea1156a1f02d0cd
                                  • Instruction Fuzzy Hash: 7821DE307107048FCB54EF24D894AAABBF6BF89311F1445AAE5069B361DB70EC05CBA2
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e94b1ee5497dd1264f3c3440d580e22859deaf41527edca494c1be5bae6cce10
                                  • Instruction ID: bdf11a02290dcdd48833602b9419a34778fc658f4e239e1a99ec5e060f50643b
                                  • Opcode Fuzzy Hash: e94b1ee5497dd1264f3c3440d580e22859deaf41527edca494c1be5bae6cce10
                                  • Instruction Fuzzy Hash: FB213D31A00218DFCB159FA9C4549EE7FB6FB8C320F14552AE411BB390DB319841CBA1
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4125932447.000000000329D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0329D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_329d000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 98571ca9a1c7f91300579d2d0c28915f0b47492da43f47c56a0bd8c2adb485b6
                                  • Instruction ID: cc3a4f2dd343018737347f63b3a3e1088d52edf78311452682e5fe7a34a1c408
                                  • Opcode Fuzzy Hash: 98571ca9a1c7f91300579d2d0c28915f0b47492da43f47c56a0bd8c2adb485b6
                                  • Instruction Fuzzy Hash: 72219A755093808FDB02CF24D994B15BF71EB46314F29C5EBD8498F2A7C33A984ADB62
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ee7212c6a290bd248b2dcc1782275a24da76aa82001cbfeb9b33bdb30bea971f
                                  • Instruction ID: 8bfadc577f2f5a9a4b0a9a9abff723b7afa4585412f03cee1a342bc7b093276a
                                  • Opcode Fuzzy Hash: ee7212c6a290bd248b2dcc1782275a24da76aa82001cbfeb9b33bdb30bea971f
                                  • Instruction Fuzzy Hash: D4117934B107048FCB54EF28D994AAAB7F6FF88300F144569E5069B360DB70ED05DBA1
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 23b21d40979c23d271ba83a366a9b98eb03285c9f376e5bc1d8e07015d879946
                                  • Instruction ID: 6385cb74bfd19dd3ed6fd972c26a6bd38d4bd2c9d5ba0cf04f14c48dfa3f52ed
                                  • Opcode Fuzzy Hash: 23b21d40979c23d271ba83a366a9b98eb03285c9f376e5bc1d8e07015d879946
                                  • Instruction Fuzzy Hash: 40115E34A15225DFCB11DB58DC94EAD7BB2FF44224F05015AF411AB3A2CB75AC41CB41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e747041da651008a430d3938ce16a71c0f5bf5047acb17f858dcd774221f109
                                  • Instruction ID: 28305b067bab5a409c7700ed11f666192ae222bb2b18042a6ece684fad013872
                                  • Opcode Fuzzy Hash: 5e747041da651008a430d3938ce16a71c0f5bf5047acb17f858dcd774221f109
                                  • Instruction Fuzzy Hash: 2C115E35119280DFC7039F64DC55D90BF72FF4621571A80DBE1449F573C626E826EB52
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 328ffcbd24ed529c8145a65a744acce174e843bd48793d901c8f9fc200963dad
                                  • Instruction ID: f629cd264653b0a9db3f79e631af17cd998fad07adf552d208571b2fe852b625
                                  • Opcode Fuzzy Hash: 328ffcbd24ed529c8145a65a744acce174e843bd48793d901c8f9fc200963dad
                                  • Instruction Fuzzy Hash: 8501246605E7C09FD3162BB09C654A53F70FE53351B5E84EFC4809A2A3E229884ADB62
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ee2eeaedf9df3f73c52c89076974b35b954e0d6b79c91be9718ed79b32962cb7
                                  • Instruction ID: 2b01fa1a63e4ce3c8ec26a2935e58aa9a2e3bb9276e1cca98bfb52943c27bd06
                                  • Opcode Fuzzy Hash: ee2eeaedf9df3f73c52c89076974b35b954e0d6b79c91be9718ed79b32962cb7
                                  • Instruction Fuzzy Hash: 2D01C431300740CFC325AB38D494A7ABBA2BFC9311F5885AED0564B7A1CB35E842DB50
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2cc890dfed26dba92bb45c3c8ed323e8af536fa2d941f85cc2d8bb929aa220ef
                                  • Instruction ID: 0a0c0bd46d75d81670591d9b81374bff401bdf6356d0c1b0a9f1f01829955f3d
                                  • Opcode Fuzzy Hash: 2cc890dfed26dba92bb45c3c8ed323e8af536fa2d941f85cc2d8bb929aa220ef
                                  • Instruction Fuzzy Hash: 73019231E11745DFCB01EFA9D50459DBFB5BF89321B0185AEE045EB320EB309A08CB62
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e350e2af78f9b550dab8c4d681cd5db489b32fd73bacce32adc8ad6db977ad82
                                  • Instruction ID: 18aaad3ba8128d5a30ba6f0d0d7a4477b2240ae8ce200226288996bc95590ffc
                                  • Opcode Fuzzy Hash: e350e2af78f9b550dab8c4d681cd5db489b32fd73bacce32adc8ad6db977ad82
                                  • Instruction Fuzzy Hash: B601B135300700DFC319AB29D454A6BBBA2BFC9721F5485ADD5164B790CB75EC42DB90
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8aca1e13d146d7d7611b70c5615c243d50aef232ef66e35062d441246480375c
                                  • Instruction ID: e4bf3bcbf768169a56d3ce665fa4ef4189269e9d6d3fa7adcf6651677bd03d23
                                  • Opcode Fuzzy Hash: 8aca1e13d146d7d7611b70c5615c243d50aef232ef66e35062d441246480375c
                                  • Instruction Fuzzy Hash: 4601B539300A408FC305AB65D414959BF62EFCD71171081ADE4468B764CF35EC42CF91
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3576550058ed516608f7ea96d7a9eea95aebf1c4a0fb4863ce35046368704c35
                                  • Instruction ID: 700231b2800543e3f18fbbe3d88065d534dcdddce974cbffe8359fd6c75db8fa
                                  • Opcode Fuzzy Hash: 3576550058ed516608f7ea96d7a9eea95aebf1c4a0fb4863ce35046368704c35
                                  • Instruction Fuzzy Hash: 7101A4393147009FC7059B19D854E2A7BB5FF8A761B1540AAF986CB361CE31DC42CB91
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 68a9d5fee9e6e38cdff620ee4d0f9d1f5bdc6f869db1014e41224d9eeefcbb31
                                  • Instruction ID: 7786829666898da32a85019add353ccf205f72256f343ce7c1ce0e44468a434a
                                  • Opcode Fuzzy Hash: 68a9d5fee9e6e38cdff620ee4d0f9d1f5bdc6f869db1014e41224d9eeefcbb31
                                  • Instruction Fuzzy Hash: A4F05925308B50DBC70136295814B3F3B9EAFC2162B0440AFE440EF3D1CEB48C4683E2
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f52659d91bf7a066ebc8ea90f41a8428befa3e64b34501d28992fcdb6d9c593c
                                  • Instruction ID: 0e735eec511729fb978de4706a6c5fd36b2eb50d4ae06a2a699a99438f9a760c
                                  • Opcode Fuzzy Hash: f52659d91bf7a066ebc8ea90f41a8428befa3e64b34501d28992fcdb6d9c593c
                                  • Instruction Fuzzy Hash: A2014F35E00609DFCB00EFA9D54499EBBF9FF89711F10856AE519E7310EB30AA08CB61
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d69f42db5b78a2884864b44b69fdb046ab7f2eb6691c528877effce73270ee5
                                  • Instruction ID: 8781c167c4e2d08a5ddb49fbc999a44419fd6a0e8e2876d6b809b83d98e5cfdb
                                  • Opcode Fuzzy Hash: 1d69f42db5b78a2884864b44b69fdb046ab7f2eb6691c528877effce73270ee5
                                  • Instruction Fuzzy Hash: 06013C79300A149FC719AB65D46891EBBA7EFCC711B108169E9068B7A4CF36ED43CF90
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4125872005.000000000328D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0328D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_328d000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33f3e0919e44dde37940579b077b2555b50399ff191ff31012fd66544bd5e468
                                  • Instruction ID: 79878504a489299b92fb628914f7b8e70222cdc71fb2f88dfc47de033640b197
                                  • Opcode Fuzzy Hash: 33f3e0919e44dde37940579b077b2555b50399ff191ff31012fd66544bd5e468
                                  • Instruction Fuzzy Hash: 19F0F976200614AF9720DF0AD884C23FBADFBD4674719C55AE84A4B756C671FC41CEA0
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4125872005.000000000328D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0328D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_328d000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 981221a0bca3291f411c324931fe547dd12172fdedd74999c2e6c5f5db41ce6c
                                  • Instruction ID: 7449dc42c89088b28b0a73ab8987bd6d9830c614fcb17ac5c1e33db2a66ccce9
                                  • Opcode Fuzzy Hash: 981221a0bca3291f411c324931fe547dd12172fdedd74999c2e6c5f5db41ce6c
                                  • Instruction Fuzzy Hash: BBF03C75104640AFD315DF06CC84C23BBB9FF856607198489E88A4B352C671FC42CF60
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d2617ccbb2b518718bbf0310395989322db35401e98ead64416257defafc70f
                                  • Instruction ID: 71155319b7fd43b7f310fd802404550f05b9d348d6bcd1f65122b6175aec616b
                                  • Opcode Fuzzy Hash: 7d2617ccbb2b518718bbf0310395989322db35401e98ead64416257defafc70f
                                  • Instruction Fuzzy Hash: 04F09A34A44229DBDB11EF54DC99FEEBBB6FF88221F01801AE406A72A1CB745C05CB81
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1050fb77477c557a47d8fd74a7df4240605a760f069fcbfb016a59a79472270a
                                  • Instruction ID: 5f1e7178232bce60c4d87b3a2e293cc0ae3e2f82b7000014d62a88a6b6aa23df
                                  • Opcode Fuzzy Hash: 1050fb77477c557a47d8fd74a7df4240605a760f069fcbfb016a59a79472270a
                                  • Instruction Fuzzy Hash: C4F0FE353107009FC714DB19D895D3A77BAEFC9761B154069F9568B760CE72EC42CB90
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d0d07fc9677809517f906e85f64f30d829bc0b03d54cdc6195e22f172ca3196
                                  • Instruction ID: edd4fe1e04f2df8e8a71a0092197fba6ea0b38af040355fe0fc5f272c9b187f6
                                  • Opcode Fuzzy Hash: 0d0d07fc9677809517f906e85f64f30d829bc0b03d54cdc6195e22f172ca3196
                                  • Instruction Fuzzy Hash: 86D02B767052400FD749E3F458241AE3797CFC5120344C4AFC149CBBA5DD744C038715
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ba453eb3aa37462806fe6ecae1a4fdb277fccf74efddc0f28f1d553f53354fa
                                  • Instruction ID: e899844b4f628a3c0218128d28930c53e98a4bcdfd16e0bec9d0b1665879bfb0
                                  • Opcode Fuzzy Hash: 3ba453eb3aa37462806fe6ecae1a4fdb277fccf74efddc0f28f1d553f53354fa
                                  • Instruction Fuzzy Hash: 21D05E3810CB818FDB2A4725B81451A3F31FF8335671545DBD086DE156C5358CD6E792
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5de4fdc9cd3d89c41449b57523f7f3c1f4521b8424d446edba71df78cdb3693c
                                  • Instruction ID: b85004a269cbd46fa5486ba81255449de0706ee0a613353a3ac3d693d8505e7e
                                  • Opcode Fuzzy Hash: 5de4fdc9cd3d89c41449b57523f7f3c1f4521b8424d446edba71df78cdb3693c
                                  • Instruction Fuzzy Hash: 42D0C93A7102184BCB0CA6FAA8145AF72DFDBC9261B54846A950A87B54CDB4AC0146A9
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06150eb54a0b148cfbe97e4de79b33de7796373b84db63b020960085c2754088
                                  • Instruction ID: 864a5d874e1a7436052e1aa423417cea2c5426c2c2e18a8201c10076b5bfb28a
                                  • Opcode Fuzzy Hash: 06150eb54a0b148cfbe97e4de79b33de7796373b84db63b020960085c2754088
                                  • Instruction Fuzzy Hash: 66D05E3800E2C08FC307CB14C851800BF31EF87265728C4CBD0449F163C6269907C753
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0517a0be6a414d4e8f5e70e243f5ed2176308ab4ae07ce465eec3fda36e79a12
                                  • Instruction ID: c12b2347baa4506d4b9b0775252a941ea42cb00b0745f27be9e95f8055e2471b
                                  • Opcode Fuzzy Hash: 0517a0be6a414d4e8f5e70e243f5ed2176308ab4ae07ce465eec3fda36e79a12
                                  • Instruction Fuzzy Hash: F0C0023B3500149F87009B6DF884C99B7B9EBD9675320816BF209CB230C67298159B50
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d7513fe45aeee413f326979f8c2824296ab76e6bba30175a3655019aaece2d77
                                  • Instruction ID: d872a967db28a978c0b0eb49c2043918d33cfc796799ceb6808d578454397424
                                  • Opcode Fuzzy Hash: d7513fe45aeee413f326979f8c2824296ab76e6bba30175a3655019aaece2d77
                                  • Instruction Fuzzy Hash: ACD09E3504D7809FC3029B24E8558657FB19E56661B2AC4DAE1C8CB173C2358CA5CB12
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                  • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0ca88d1fc480568cc1818dc8828829097fc693fef84d779e1cda7e618d365864
                                  • Instruction ID: 1e2973e350cfdb6d215468bc93f9e09787770a2bc36312318141bc1725f43a4b
                                  • Opcode Fuzzy Hash: 0ca88d1fc480568cc1818dc8828829097fc693fef84d779e1cda7e618d365864
                                  • Instruction Fuzzy Hash: 30B09232004308AB8600AA84E908855BB69EB58600B00C025A609061119B32A822DA94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4154248720.0000000008580000.00000040.00000800.00020000.00000000.sdmp, Offset: 08580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_8580000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (_kq$(_kq$(_kq$(_kq
                                  • API String ID: 0-3111510350
                                  • Opcode ID: 8aa0eedc0b08126ba29033f7088219d8a59db27ab1b5f024994d46d989963358
                                  • Instruction ID: bb5b48506edef1231dc33cf856eced1f59359036b149f1fde3c38f254e8b698c
                                  • Opcode Fuzzy Hash: 8aa0eedc0b08126ba29033f7088219d8a59db27ab1b5f024994d46d989963358
                                  • Instruction Fuzzy Hash: 2461D234A44744CFC705EF78D4544AE7FB2BF8A21072444AEE446EB3A2DA35DC86CB91

                                  Execution Graph

                                  Execution Coverage:8.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:463
                                  Total number of Limit Nodes:38
                                  execution_graph 26566 5bec3af 26567 5bec38d 26566->26567 26568 5bec3b3 26566->26568 26570 5be4630 7 API calls 26567->26570 26569 5bec395 26568->26569 26571 5be4630 7 API calls 26568->26571 26570->26569 26572 5bec3d0 26571->26572 26172 1b5c1f0 26173 1b5c232 26172->26173 26174 1b5c238 GetModuleHandleW 26172->26174 26173->26174 26175 1b5c265 26174->26175 26573 1b56540 26574 1b56586 26573->26574 26579 1b56780 26574->26579 26586 1b5670f 26574->26586 26591 1b56720 26574->26591 26575 1b56673 26580 1b56783 DuplicateHandle 26579->26580 26581 1b56738 26579->26581 26583 1b5681e 26580->26583 26594 1b5611c 26581->26594 26583->26575 26587 1b56713 26586->26587 26590 1b566c8 26586->26590 26588 1b5611c DuplicateHandle 26587->26588 26589 1b5674e 26587->26589 26588->26589 26589->26575 26590->26575 26592 1b5674e 26591->26592 26593 1b5611c DuplicateHandle 26591->26593 26592->26575 26593->26592 26595 1b56788 DuplicateHandle 26594->26595 26596 1b5674e 26595->26596 26596->26575 26176 5be44b8 26177 5be44c8 26176->26177 26181 5be8e08 26177->26181 26187 5be8df9 26177->26187 26178 5be44f1 26182 5be8e3d 26181->26182 26193 5be5c08 26182->26193 26184 5be8e92 26205 5be7c50 26184->26205 26186 5be8e99 26186->26178 26188 5be8e08 26187->26188 26189 5be5c08 7 API calls 26188->26189 26190 5be8e92 26189->26190 26191 5be7c50 7 API calls 26190->26191 26192 5be8e99 26191->26192 26192->26178 26197 5be5c34 26193->26197 26195 5be4630 7 API calls 26196 5be6013 26195->26196 26196->26184 26203 5be5e6c 26197->26203 26215 5be55fc 26197->26215 26198 5be5ced 26199 5be4630 7 API calls 26198->26199 26204 5be5d95 26198->26204 26200 5be5d5f 26199->26200 26201 5be4630 7 API calls 26200->26201 26201->26204 26203->26195 26203->26196 26221 5be4630 26204->26221 26206 5be7c5b 26205->26206 26207 5be93fd 26206->26207 26208 5be9435 26206->26208 26214 5be9404 26206->26214 26209 5be4630 7 API calls 26207->26209 26210 5be945a 26208->26210 26211 5be9486 26208->26211 26209->26214 26213 5be4630 7 API calls 26210->26213 26212 5be4630 7 API calls 26211->26212 26212->26214 26213->26214 26214->26186 26217 5be5607 26215->26217 26216 5be4630 7 API calls 26220 5be6169 26216->26220 26218 5be4630 7 API calls 26217->26218 26219 5be61a7 26217->26219 26217->26220 26218->26220 26219->26198 26220->26216 26220->26219 26222 5be4640 26221->26222 26223 5be467d 26222->26223 26226 5be7cb0 26222->26226 26246 5be7cc0 26222->26246 26223->26203 26233 5be7cf9 26226->26233 26228 5be7e03 26270 5be7030 26228->26270 26230 5be7e0d 26284 5be78bc 26230->26284 26266 5be78ac 26233->26266 26235 5be7f1f 26238 5be7f80 26235->26238 26302 1b5f01c 26235->26302 26236 5be7e3c 26236->26235 26237 5be4630 7 API calls 26236->26237 26240 5be7ec5 26237->26240 26306 5becfa7 26238->26306 26311 5becf90 26238->26311 26315 5becf80 26238->26315 26239 5be7f94 26240->26235 26295 5be5a6c 26240->26295 26253 5be7cf9 26246->26253 26247 5be78ac 7 API calls 26248 5be7e03 26247->26248 26249 5be7030 7 API calls 26248->26249 26250 5be7e0d 26249->26250 26251 5be78bc 7 API calls 26250->26251 26252 5be7e15 26251->26252 26254 5be78cc 7 API calls 26252->26254 26256 5be7e3c 26252->26256 26253->26247 26254->26256 26255 5be7f1f 26258 5be7f80 26255->26258 26262 1b5f01c 7 API calls 26255->26262 26256->26255 26257 5be4630 7 API calls 26256->26257 26260 5be7ec5 26257->26260 26263 5becfa7 7 API calls 26258->26263 26264 5becf90 7 API calls 26258->26264 26265 5becf80 7 API calls 26258->26265 26259 5be7f94 26260->26255 26261 5be5a6c 7 API calls 26260->26261 26261->26255 26262->26258 26263->26259 26264->26259 26265->26259 26268 5be78b7 26266->26268 26267 5be96b8 26267->26228 26268->26267 26269 5be4630 7 API calls 26268->26269 26269->26267 26273 5be703b 26270->26273 26271 5be9868 26271->26230 26272 5be97e1 26274 5be981a 26272->26274 26275 5be5a6c 7 API calls 26272->26275 26273->26271 26273->26272 26277 5be9834 26273->26277 26319 5be8fe4 26273->26319 26276 5be5a6c 7 API calls 26274->26276 26278 5be980c 26275->26278 26279 5be9826 26276->26279 26277->26271 26282 5be4630 7 API calls 26277->26282 26323 5be8ff4 26278->26323 26281 5be8ff4 7 API calls 26279->26281 26281->26277 26282->26271 26285 5be78c7 26284->26285 26286 5be7e15 26285->26286 26287 5be4630 7 API calls 26285->26287 26286->26236 26290 5be78cc 26286->26290 26288 5beb5ec 26287->26288 26333 5be9de8 26288->26333 26293 5be78d7 26290->26293 26291 5bebcb6 26291->26236 26292 5be4630 7 API calls 26294 5bebd86 26292->26294 26293->26291 26293->26292 26294->26236 26297 5be5a77 26295->26297 26296 5beb4ae 26296->26235 26297->26296 26298 5be4630 7 API calls 26297->26298 26299 5beb508 26298->26299 26300 5be9dc0 SendMessageW 26299->26300 26301 5beb519 26300->26301 26301->26235 26303 1b5f027 26302->26303 26305 1b5f8f5 26303->26305 26343 1b5c4b8 26303->26343 26305->26238 26307 5becf8d 26306->26307 26310 5becfb3 26306->26310 26308 5be78bc 7 API calls 26307->26308 26309 5becfa4 26308->26309 26309->26239 26310->26239 26312 5becf9d 26311->26312 26313 5be78bc 7 API calls 26312->26313 26314 5becfa4 26313->26314 26314->26239 26316 5becf90 26315->26316 26317 5be78bc 7 API calls 26316->26317 26318 5becfa4 26317->26318 26318->26239 26320 5be8fef 26319->26320 26329 5be9d94 7 API calls 26320->26329 26322 5beb35d 26322->26272 26324 5be8fff 26323->26324 26325 5be4630 7 API calls 26324->26325 26326 5beb508 26325->26326 26330 5be9dc0 26326->26330 26329->26322 26331 5beb530 SendMessageW 26330->26331 26332 5beb519 26331->26332 26332->26274 26334 5be9df3 26333->26334 26337 5be7ae8 26334->26337 26336 5beb6d4 26336->26286 26339 5be7af3 26337->26339 26338 5bebab7 26338->26336 26339->26338 26340 5be4630 7 API calls 26339->26340 26341 5beb8d4 26340->26341 26341->26338 26342 5be78bc 7 API calls 26341->26342 26342->26338 26344 1b5c4c3 26343->26344 26347 1b5f104 26344->26347 26346 1b5fdcf 26346->26305 26350 1b5f10f 26347->26350 26348 1b5ff78 26348->26346 26349 1b5ff41 26355 5bed2b8 26349->26355 26361 5bed260 26349->26361 26366 5bed250 26349->26366 26350->26348 26350->26349 26351 1b5f104 7 API calls 26350->26351 26351->26350 26356 5bed295 26355->26356 26357 5bed2c3 26356->26357 26371 5bed5b8 26356->26371 26377 5bed5a8 26356->26377 26357->26348 26358 5bed2af 26358->26348 26362 5bed272 26361->26362 26363 5bed2af 26362->26363 26364 5bed5b8 7 API calls 26362->26364 26365 5bed5a8 7 API calls 26362->26365 26363->26348 26364->26363 26365->26363 26368 5bed260 26366->26368 26367 5bed2af 26367->26348 26368->26367 26369 5bed5b8 7 API calls 26368->26369 26370 5bed5a8 7 API calls 26368->26370 26369->26367 26370->26367 26384 5be7518 26371->26384 26396 5be7507 26371->26396 26372 5bed5d0 26408 5bec67c 26372->26408 26374 5bed5d9 26374->26358 26378 5bed5b8 26377->26378 26382 5be7518 7 API calls 26378->26382 26383 5be7507 7 API calls 26378->26383 26379 5bed5d0 26380 5bec67c 7 API calls 26379->26380 26381 5bed5d9 26380->26381 26381->26358 26382->26379 26383->26379 26388 5be753e 26384->26388 26385 5be7552 26385->26372 26386 5be762f 26395 1b5e2c0 7 API calls 26386->26395 26387 5be763d 26389 5be4630 7 API calls 26387->26389 26390 5be7665 26387->26390 26388->26385 26388->26386 26391 5be7692 26388->26391 26389->26390 26390->26372 26391->26390 26392 5be4630 7 API calls 26391->26392 26393 5be7737 26392->26393 26393->26390 26394 5be7030 7 API calls 26393->26394 26394->26390 26395->26387 26399 5be7518 26396->26399 26397 5be7552 26397->26372 26398 5be762f 26407 1b5e2c0 7 API calls 26398->26407 26399->26397 26399->26398 26403 5be7692 26399->26403 26400 5be763d 26401 5be4630 7 API calls 26400->26401 26402 5be7665 26400->26402 26401->26402 26402->26372 26403->26402 26404 5be4630 7 API calls 26403->26404 26405 5be7737 26404->26405 26405->26402 26406 5be7030 7 API calls 26405->26406 26406->26402 26407->26400 26409 5bec687 26408->26409 26410 5beda74 26409->26410 26411 5bedaf8 7 API calls 26409->26411 26412 5bedae7 7 API calls 26409->26412 26410->26374 26411->26410 26412->26410 26413 5be2018 SetWindowLongW 26414 5be2084 26413->26414 26597 5be99c8 26598 5be99d9 26597->26598 26601 5be9a43 26598->26601 26602 5be9068 26598->26602 26603 5be9073 26602->26603 26604 5be9a3c 26603->26604 26607 5beb168 26603->26607 26613 5beb159 26603->26613 26619 5be9d7c 26607->26619 26609 5beb18f 26609->26604 26611 5beb1b8 CreateIconFromResourceEx 26612 5beb236 26611->26612 26612->26604 26614 5beb182 26613->26614 26615 5be9d7c CreateIconFromResourceEx 26613->26615 26616 5beb18f 26614->26616 26617 5beb1b8 CreateIconFromResourceEx 26614->26617 26615->26614 26616->26604 26618 5beb236 26617->26618 26618->26604 26620 5beb1b8 CreateIconFromResourceEx 26619->26620 26621 5beb182 26620->26621 26621->26609 26621->26611 26415 1b0d01c 26416 1b0d034 26415->26416 26417 1b0d08e 26416->26417 26420 5be2f28 26416->26420 26429 5be2f18 26416->26429 26423 5be2f55 26420->26423 26421 5be2f89 26454 5be2b64 26421->26454 26423->26421 26424 5be2f79 26423->26424 26438 5be317c 26424->26438 26444 5be30a0 26424->26444 26449 5be30b0 26424->26449 26425 5be2f87 26431 5be2f28 26429->26431 26430 5be2f89 26432 5be2b64 CallWindowProcW 26430->26432 26431->26430 26433 5be2f79 26431->26433 26434 5be2f87 26432->26434 26435 5be317c 8 API calls 26433->26435 26436 5be30b0 8 API calls 26433->26436 26437 5be30a0 8 API calls 26433->26437 26435->26434 26436->26434 26437->26434 26439 5be313a 26438->26439 26440 5be318a 26438->26440 26458 5be3168 26439->26458 26463 5be3159 26439->26463 26441 5be3150 26441->26425 26446 5be30c4 26444->26446 26445 5be3150 26445->26425 26447 5be3168 8 API calls 26446->26447 26448 5be3159 8 API calls 26446->26448 26447->26445 26448->26445 26451 5be30c4 26449->26451 26450 5be3150 26450->26425 26452 5be3168 8 API calls 26451->26452 26453 5be3159 8 API calls 26451->26453 26452->26450 26453->26450 26455 5be2b6f 26454->26455 26456 5be43ea CallWindowProcW 26455->26456 26457 5be4399 26455->26457 26456->26457 26457->26425 26459 5be3179 26458->26459 26468 5be8270 26458->26468 26485 5be4320 26458->26485 26488 5be8260 26458->26488 26459->26441 26464 5be3179 26463->26464 26465 5be8270 8 API calls 26463->26465 26466 5be8260 8 API calls 26463->26466 26467 5be4320 CallWindowProcW 26463->26467 26464->26441 26465->26464 26466->26464 26467->26464 26469 5be8289 26468->26469 26475 5be829c 26468->26475 26470 5be828e 26469->26470 26471 5be82d0 26469->26471 26472 5be82aa 26470->26472 26473 5be8293 26470->26473 26474 5be855c 26471->26474 26471->26475 26472->26475 26479 5be84c8 26472->26479 26480 5be8524 26472->26480 26483 5be83d6 26472->26483 26473->26475 26476 5be84ba 26473->26476 26513 5be7b88 26474->26513 26475->26483 26519 5be8a00 26475->26519 26505 5be7ad8 26476->26505 26481 5be7ae8 7 API calls 26479->26481 26509 5be7b48 26480->26509 26481->26483 26483->26459 26486 5be2b64 CallWindowProcW 26485->26486 26487 5be433a 26486->26487 26487->26459 26489 5be8270 26488->26489 26490 5be828e 26489->26490 26491 5be82d0 26489->26491 26493 5be829c 26489->26493 26492 5be8293 26490->26492 26498 5be82aa 26490->26498 26491->26493 26494 5be855c 26491->26494 26492->26493 26495 5be84ba 26492->26495 26503 5be83d6 26493->26503 26504 5be8a00 8 API calls 26493->26504 26497 5be7b88 8 API calls 26494->26497 26496 5be7ad8 8 API calls 26495->26496 26496->26503 26497->26503 26498->26493 26499 5be84c8 26498->26499 26500 5be8524 26498->26500 26498->26503 26501 5be7ae8 7 API calls 26499->26501 26502 5be7b48 8 API calls 26500->26502 26501->26503 26502->26503 26503->26459 26504->26503 26506 5be7ae3 26505->26506 26507 5be8a00 8 API calls 26506->26507 26508 5be8c16 26507->26508 26508->26483 26510 5be7b53 26509->26510 26511 5be8a00 8 API calls 26510->26511 26512 5bed0fc 26511->26512 26512->26483 26514 5be7b93 26513->26514 26515 5be7ae8 7 API calls 26514->26515 26516 5bec980 26515->26516 26517 5be8a00 8 API calls 26516->26517 26518 5bec989 26517->26518 26518->26483 26520 5be8a0b 26519->26520 26521 5be8a12 26519->26521 26520->26483 26524 5be8a20 26521->26524 26522 5be8a18 26522->26483 26525 5be8a60 26524->26525 26526 5be8a3e 26524->26526 26527 5be3720 8 API calls 26525->26527 26528 5be8a4c 26526->26528 26532 5be3720 26526->26532 26531 5be8a67 26527->26531 26528->26522 26530 5be8a88 26530->26522 26531->26522 26533 5be376c 26532->26533 26534 5be3edc 26533->26534 26537 5be37b0 26533->26537 26540 5be351c 26534->26540 26536 5be3a0c 26536->26530 26537->26536 26544 5be8a90 26537->26544 26548 5be8aa0 26537->26548 26541 5be3527 26540->26541 26542 5bed198 26541->26542 26543 1b5c4b8 7 API calls 26541->26543 26542->26536 26543->26542 26545 5be8aa0 26544->26545 26546 5be2b64 CallWindowProcW 26545->26546 26547 5be8b09 26545->26547 26546->26547 26547->26536 26549 5be8ae6 26548->26549 26550 5be2b64 CallWindowProcW 26549->26550 26551 5be8b09 26549->26551 26550->26551 26551->26536 26552 5be5eb3 26553 5be5ebc 26552->26553 26555 5be5eda 26552->26555 26554 5be4630 7 API calls 26553->26554 26553->26555 26554->26555 26556 5be4630 7 API calls 26555->26556 26557 5be6013 26555->26557 26556->26557 26558 1b5c698 26559 1b5c6ac 26558->26559 26560 1b5c6d1 26559->26560 26562 1b5c294 26559->26562 26563 1b5c878 LoadLibraryExW 26562->26563 26565 1b5c8f1 26563->26565 26565->26560 26622 1b54668 26623 1b54676 26622->26623 26632 1b56de0 26623->26632 26626 1b54704 26641 5be6b00 26626->26641 26645 5be6b10 26626->26645 26649 5be6ad1 26626->26649 26627 1b5470c 26633 1b56e05 26632->26633 26654 1b56ef0 26633->26654 26658 1b56edf 26633->26658 26634 1b546e9 26637 1b5421c 26634->26637 26638 1b54227 26637->26638 26666 1b58560 26638->26666 26640 1b58806 26640->26626 26642 5be6b10 26641->26642 26712 5be5ad8 26642->26712 26646 5be6b22 26645->26646 26647 5be5ad8 7 API calls 26646->26647 26648 5be6b42 26647->26648 26648->26627 26650 5be6b19 26649->26650 26652 5be6ada 26649->26652 26651 5be5ad8 7 API calls 26650->26651 26653 5be6b42 26651->26653 26652->26627 26653->26627 26655 1b56f17 26654->26655 26656 1b56ff4 26655->26656 26662 1b56414 26655->26662 26656->26656 26660 1b56ef0 26658->26660 26659 1b56ff4 26659->26659 26660->26659 26661 1b56414 CreateActCtxA 26660->26661 26661->26659 26663 1b57370 CreateActCtxA 26662->26663 26665 1b57433 26663->26665 26667 1b5856b 26666->26667 26670 1b58580 26667->26670 26669 1b588dd 26669->26640 26671 1b5858b 26670->26671 26674 1b585b0 26671->26674 26673 1b589ba 26673->26669 26675 1b585bb 26674->26675 26678 1b585e0 26675->26678 26677 1b58aad 26677->26673 26680 1b585eb 26678->26680 26679 1b59ed1 26679->26677 26680->26679 26682 1b5df70 26680->26682 26684 1b5df91 26682->26684 26683 1b5dfb5 26683->26679 26684->26683 26686 1b5e120 26684->26686 26687 1b5e12d 26686->26687 26688 1b5e166 26687->26688 26690 1b5c464 26687->26690 26688->26683 26692 1b5c46f 26690->26692 26691 1b5e1d8 26692->26691 26694 1b5c498 26692->26694 26695 1b5c4a3 26694->26695 26696 1b585e0 7 API calls 26695->26696 26697 1b5e247 26696->26697 26704 1b5e2c0 26697->26704 26698 1b5e256 26699 1b5c4a8 7 API calls 26698->26699 26700 1b5e270 26699->26700 26701 1b5c4b8 7 API calls 26700->26701 26702 1b5e277 26701->26702 26702->26691 26705 1b5e2ee 26704->26705 26706 1b5e3bf 26705->26706 26710 1b5e42b 26705->26710 26711 5be4630 6 API calls 26705->26711 26707 1b5c4b8 6 API calls 26706->26707 26706->26710 26707->26710 26708 1b5e366 26709 1b5e3ba KiUserCallbackDispatcher 26708->26709 26709->26706 26711->26708 26713 5be5ae3 26712->26713 26716 5be5b14 26713->26716 26715 5be6c54 26718 5be5b1f 26716->26718 26717 5be6e00 7 API calls 26721 5be72c9 26717->26721 26720 5be716e 26718->26720 26718->26721 26722 5be6e00 26718->26722 26720->26717 26720->26721 26721->26715 26723 5be6e0b 26722->26723 26725 5be7518 7 API calls 26723->26725 26726 5be7507 7 API calls 26723->26726 26724 5be7504 26724->26720 26725->26724 26726->26724

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 754 5bec90c-5bee161 758 5bee16e 754->758 759 5bee163-5bee16c 754->759 760 5bee170-5bee175 758->760 759->760 761 5bee177-5bee194 760->761 762 5bee195-5bee22a 760->762 769 5bee22c-5bee234 762->769 770 5bee236-5bee266 EnumThreadWindows 762->770 769->770 771 5bee26f-5bee29c 770->771 772 5bee268-5bee26e 770->772 772->771
                                  APIs
                                  • EnumThreadWindows.USER32(EC8B5505,00000000,?), ref: 05BEE259
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: EnumThreadWindows
                                  • String ID:
                                  • API String ID: 2941952884-0
                                  • Opcode ID: bec10d94735c65875514595820294838b147c07ae3c89b3c8b2ea9885ae6cf3c
                                  • Instruction ID: 4465284aac28b45e3eac7fe61007a71be05ab31ca35ab5dcafd3777f330e3f64
                                  • Opcode Fuzzy Hash: bec10d94735c65875514595820294838b147c07ae3c89b3c8b2ea9885ae6cf3c
                                  • Instruction Fuzzy Hash: 3541B171A042059FDB14DF99C844BAEFBF9EF88310F18846AE419E7350DB38A941CB65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 776 5be2b64-5be438c 780 5be443c-5be445c 776->780 781 5be4392-5be4397 776->781 787 5be445f-5be446c 780->787 782 5be43ea-5be4422 CallWindowProcW 781->782 783 5be4399-5be43d0 781->783 784 5be442b-5be443a 782->784 785 5be4424-5be442a 782->785 790 5be43d9-5be43e8 783->790 791 5be43d2-5be43d8 783->791 784->787 785->784 790->787 791->790
                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 05BE4411
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: 09e9e1b89a9b677636358e170e46fef70aa5cbf942b76061aa54ce404e5ef8d4
                                  • Instruction ID: 0090760e46adf02e70fa5bc028c11cb2b84ae01455ebd3ddad86bcbe268c9c26
                                  • Opcode Fuzzy Hash: 09e9e1b89a9b677636358e170e46fef70aa5cbf942b76061aa54ce404e5ef8d4
                                  • Instruction Fuzzy Hash: 5A411BB5A00205CFCB14DF99C488AAAFBF5FF88314F28C499D519A7321D775A841CFA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 793 1b56414-1b57431 CreateActCtxA 796 1b57433-1b57439 793->796 797 1b5743a-1b57494 793->797 796->797 804 1b57496-1b57499 797->804 805 1b574a3-1b574a7 797->805 804->805 806 1b574a9-1b574b5 805->806 807 1b574b8 805->807 806->807 809 1b574b9 807->809 809->809
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 01B57421
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1788548885.0000000001B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_1b50000_workbook.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: b534f616c2c9a1fce7adf347b4f5fcacbf91092d286119aaf90ba595ae349f0c
                                  • Instruction ID: f4b9665a3827bb58f65206468ff5a4a61a39c827dcda25e676a6a434beae144a
                                  • Opcode Fuzzy Hash: b534f616c2c9a1fce7adf347b4f5fcacbf91092d286119aaf90ba595ae349f0c
                                  • Instruction Fuzzy Hash: 2141C3B1D0061DCFDB24DFA9C84479DBBB5BF48304F64809AD408AB255DB756945CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 810 1b57364-1b5736b 811 1b57370-1b57431 CreateActCtxA 810->811 813 1b57433-1b57439 811->813 814 1b5743a-1b57494 811->814 813->814 821 1b57496-1b57499 814->821 822 1b574a3-1b574a7 814->822 821->822 823 1b574a9-1b574b5 822->823 824 1b574b8 822->824 823->824 826 1b574b9 824->826 826->826
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 01B57421
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1788548885.0000000001B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_1b50000_workbook.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 798ac80556205b315c7488e71f4be115e2eda39b641ee6e31f67480d878b27a6
                                  • Instruction ID: ed09c134bd966720c7b30c16a82bb93477a6c157f5cabc2c3bd9dfd2ecf0cffd
                                  • Opcode Fuzzy Hash: 798ac80556205b315c7488e71f4be115e2eda39b641ee6e31f67480d878b27a6
                                  • Instruction Fuzzy Hash: 6541D2B1D00619CFDB24CFA9C844BDEBFB5BF49304F64809AD408AB255DB796945CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 827 1b56780-1b56781 828 1b56783-1b5681c DuplicateHandle 827->828 829 1b56738-1b5673b 827->829 833 1b56825-1b56842 828->833 834 1b5681e-1b56824 828->834 831 1b56741-1b56749 call 1b5611c 829->831 832 1b5673d-1b5673f 829->832 836 1b5674e-1b56774 831->836 832->831 834->833
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01B5674E,?,?,?,?,?), ref: 01B5680F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1788548885.0000000001B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_1b50000_workbook.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 717cf38d4301761ed707f813668a89c72dc667e88f3866f36ecd1efe207d0212
                                  • Instruction ID: 3f09db136c61b1ebccc064d84abab2ec2f1d5fc15ad105326dd91cce31cf8ec4
                                  • Opcode Fuzzy Hash: 717cf38d4301761ed707f813668a89c72dc667e88f3866f36ecd1efe207d0212
                                  • Instruction Fuzzy Hash: EA316CB5A002089FCF00CF99D884AEEBFF5FB88320F14805AE954A3350D739A940CFA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 841 5beb168-5beb18d call 5be9d7c 844 5beb18f-5beb19f call 5beac28 841->844 845 5beb1a2-5beb234 CreateIconFromResourceEx 841->845 850 5beb23d-5beb25a 845->850 851 5beb236-5beb23c 845->851 851->850
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: CreateFromIconResource
                                  • String ID:
                                  • API String ID: 3668623891-0
                                  • Opcode ID: 3b2fb07852dfd6318cf77fd07983975ead4daf71690c8064d135b68490893c49
                                  • Instruction ID: 2ce29947ae5897701699a0b14ea19650da40cd34f851be03de09623c5d01d8ef
                                  • Opcode Fuzzy Hash: 3b2fb07852dfd6318cf77fd07983975ead4daf71690c8064d135b68490893c49
                                  • Instruction Fuzzy Hash: 76318B729043599FCB11DFA9D844AEEBFF8FF09350F18809AE554A7221C335A854CFA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 854 1b5611c-1b5681c DuplicateHandle 856 1b56825-1b56842 854->856 857 1b5681e-1b56824 854->857 857->856
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01B5674E,?,?,?,?,?), ref: 01B5680F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1788548885.0000000001B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_1b50000_workbook.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 3cbdf95ba07ecec616d0cef57573b43c941aba67ea508e8053ffd5bf848e4b95
                                  • Instruction ID: 22eb1bbec49687e6d0c0f848c078dfa5115d0b88868a2a9d8c64680dabb151b7
                                  • Opcode Fuzzy Hash: 3cbdf95ba07ecec616d0cef57573b43c941aba67ea508e8053ffd5bf848e4b95
                                  • Instruction Fuzzy Hash: 9E21E3B59002489FDB50CF9AD984AEEFFF4EB48320F14845AE954A7310D378A944CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 860 5bec91c-5bee22a 862 5bee22c-5bee234 860->862 863 5bee236-5bee266 EnumThreadWindows 860->863 862->863 864 5bee26f-5bee29c 863->864 865 5bee268-5bee26e 863->865 865->864
                                  APIs
                                  • EnumThreadWindows.USER32(EC8B5505,00000000,?), ref: 05BEE259
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: EnumThreadWindows
                                  • String ID:
                                  • API String ID: 2941952884-0
                                  • Opcode ID: 052373f153769176853a63275e418bbec46a621543fed175113b6e3d1f248c18
                                  • Instruction ID: 970f5c800f7517b4fb4c1332018df748d0397a64908d03c2f4271db0ece9fc22
                                  • Opcode Fuzzy Hash: 052373f153769176853a63275e418bbec46a621543fed175113b6e3d1f248c18
                                  • Instruction Fuzzy Hash: F22147B1904249CFDB14CF9AC844BEEFBF8FB88320F14846AE455A7250D778A944CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 869 5be9d7c-5beb234 CreateIconFromResourceEx 871 5beb23d-5beb25a 869->871 872 5beb236-5beb23c 869->872 872->871
                                  APIs
                                  • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,05BEB182,?,?,?,?,?), ref: 05BEB227
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: CreateFromIconResource
                                  • String ID:
                                  • API String ID: 3668623891-0
                                  • Opcode ID: 80fa142a979b51bb683a7dcbcb9a467f2fec51d5dc6dfc770e01662d24405f12
                                  • Instruction ID: 28e5a6d8755bb548ed1620e8c0dbac19fd0567ff3a56153ab3388fc9d1298a95
                                  • Opcode Fuzzy Hash: 80fa142a979b51bb683a7dcbcb9a467f2fec51d5dc6dfc770e01662d24405f12
                                  • Instruction Fuzzy Hash: 7A1126B6804249DFDB10CF9AD844AEEBFF8FF48320F14845AE954A7210C375A950CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 875 1b5c294-1b5c8b8 877 1b5c8c0-1b5c8ef LoadLibraryExW 875->877 878 1b5c8ba-1b5c8bd 875->878 879 1b5c8f1-1b5c8f7 877->879 880 1b5c8f8-1b5c915 877->880 878->877 879->880
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01B5C6D1,00000800,00000000,00000000), ref: 01B5C8E2
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1788548885.0000000001B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_1b50000_workbook.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 9174074a28ed90303ce36d3c66634ec4d5cc9bb7cbfb22267ae4f8b79db66cb6
                                  • Instruction ID: 9095fff457b3098addc9a22c6e64c3466f8ac1fab0b9a3c7e46aed4fd07e5f3c
                                  • Opcode Fuzzy Hash: 9174074a28ed90303ce36d3c66634ec4d5cc9bb7cbfb22267ae4f8b79db66cb6
                                  • Instruction Fuzzy Hash: 2D1103B69003498FDB14CF9AD444AAEFBF9EB48320F10846AD919A7210C375A544CFA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 883 1b5c1f0-1b5c230 884 1b5c232-1b5c235 883->884 885 1b5c238-1b5c263 GetModuleHandleW 883->885 884->885 886 1b5c265-1b5c26b 885->886 887 1b5c26c-1b5c280 885->887 886->887
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 01B5C256
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1788548885.0000000001B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_1b50000_workbook.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 8db9715f6d1557a704bfa355d6eb909c948fe65d5b94f4b1aa467b72963258c0
                                  • Instruction ID: ecf99d76b988a6441628a213c2d5e17abd5d993004219e14d2ab7a4bdff7a556
                                  • Opcode Fuzzy Hash: 8db9715f6d1557a704bfa355d6eb909c948fe65d5b94f4b1aa467b72963258c0
                                  • Instruction Fuzzy Hash: 2B110FB6C003498FDB14DF9AC444BDEFBF9EB88324F10846AD829A7610C379A545CFA5
                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 05BE2075
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: d51b421a0c38687f9e2852ace9e48050f2dcfa52b4060a75b52af8bd0454c97d
                                  • Instruction ID: 1b885dfec06dc812c4d20769ff802faa1c77f8d186822b0597863000e741b7a5
                                  • Opcode Fuzzy Hash: d51b421a0c38687f9e2852ace9e48050f2dcfa52b4060a75b52af8bd0454c97d
                                  • Instruction Fuzzy Hash: 7A1125B58002488FCB10CF9AC584BEFFBF8EB48310F14841AD859A7350C374A944CFA0
                                  APIs
                                  • SendMessageW.USER32(?,?,?,?), ref: 05BEB58D
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: a16086b1f298a5ece4e2bcdef4a5a727af6403e6a076b55a5c9fb9f79d5527d2
                                  • Instruction ID: bf6d21a2615ba83302d8e94e7e4f62e7d8f813c110cca2ab7430f9d52a71e1e7
                                  • Opcode Fuzzy Hash: a16086b1f298a5ece4e2bcdef4a5a727af6403e6a076b55a5c9fb9f79d5527d2
                                  • Instruction Fuzzy Hash: 9711F2B58003499FCB10DF9AD485BEEBBF8FB48324F14845AE958A7200D375A944CFA5
                                  APIs
                                  • SendMessageW.USER32(?,?,?,?), ref: 05BEB58D
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 6d1894c4961cc2eabe36769f7d20137ecb21dc19a00c6375788d2f7377630bf7
                                  • Instruction ID: f196145fa74c50f963c10bb6cb6354be926ee700bd8b9c4192c79e29812f4edd
                                  • Opcode Fuzzy Hash: 6d1894c4961cc2eabe36769f7d20137ecb21dc19a00c6375788d2f7377630bf7
                                  • Instruction Fuzzy Hash: 781103B58003489FCB10DF9AD885BDEFBF8FB48324F14845AE558A7200C375A944CFA5
                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 05BE2075
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1802031477.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_5be0000_workbook.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: 2771054b649a2145b62b28a1a24ca27d4e7b74b1de59b1a42f5dcc6802993943
                                  • Instruction ID: 3661a60042ea843e89cd4f823ddde31a894a909b3333c94a7dbc1bda4a5eb553
                                  • Opcode Fuzzy Hash: 2771054b649a2145b62b28a1a24ca27d4e7b74b1de59b1a42f5dcc6802993943
                                  • Instruction Fuzzy Hash: 161112B5800249CFDB10DF9AD484BEEFBF8EB48324F24845AD959A7350C375A944CFA5
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1788210496.0000000001B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_1b0d000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5571eca886e5389d97c218a98e32946f721046cfee7fd4b77d51af4c2433d9e2
                                  • Instruction ID: 5fbb5d6508cda43b3387091fab3e52896c9d9dd129a1ac59a87114860ac0f0c9
                                  • Opcode Fuzzy Hash: 5571eca886e5389d97c218a98e32946f721046cfee7fd4b77d51af4c2433d9e2
                                  • Instruction Fuzzy Hash: 40212271604200DFDB1ADF98D994B26BFA5FB88354F20C6ADD80E4B2D6D33AD447CA61
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.1788210496.0000000001B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B0D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_1b0d000_workbook.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96364319b1347acb3d8121327acccf93a35692fb6db1052983f091775d3fa404
                                  • Instruction ID: 9aa9acf770b22d393da083cc8010e46b6356b6227b90bc01b4a27093a920a8a1
                                  • Opcode Fuzzy Hash: 96364319b1347acb3d8121327acccf93a35692fb6db1052983f091775d3fa404
                                  • Instruction Fuzzy Hash: 492192755083809FCB07CF54D994B11BF71EB4A314F28C5DAD8498F2A7D33A980ACB62