Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
doc_Zapytanie - Oferta KH 09281.com.exe

Overview

General Information

Sample name:doc_Zapytanie - Oferta KH 09281.com.exe
Analysis ID:1508493
MD5:d5def75143e3302847f9e6f64a1cad4e
SHA1:8c914dd231daff31092bf5de3db22eb9c07c622d
SHA256:f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16
Tags:exe
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Quasar RAT
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • doc_Zapytanie - Oferta KH 09281.com.exe (PID: 3556 cmdline: "C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe" MD5: D5DEF75143E3302847F9E6F64A1CAD4E)
    • doc_Zapytanie - Oferta KH 09281.com.exe (PID: 1560 cmdline: "C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe" MD5: D5DEF75143E3302847F9E6F64A1CAD4E)
      • schtasks.exe (PID: 4836 cmdline: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 2136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • workbook.exe (PID: 5064 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: D5DEF75143E3302847F9E6F64A1CAD4E)
        • workbook.exe (PID: 6204 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: D5DEF75143E3302847F9E6F64A1CAD4E)
          • schtasks.exe (PID: 6488 cmdline: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • workbook.exe (PID: 6076 cmdline: C:\Users\user\AppData\Roaming\SubDir\workbook.exe MD5: D5DEF75143E3302847F9E6F64A1CAD4E)
    • workbook.exe (PID: 2316 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: D5DEF75143E3302847F9E6F64A1CAD4E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;", "SubDirectory": "SubDir", "InstallName": "workbook.exe", "MutexName": "0235e291-5d04-4fa3-932c-869aeec51499", "StartupKey": "workbook", "Tag": "Long Leg", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQANqzkhOLx49IztAjuviKazANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDgyMDEyNDQxNVoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgCzkFEuivKBaTsClmq/3wI2X1uYUZUxf0vEiobTv72lQBIu1jz/r6PADg+cpeGisY1MV3VsdWhecO8dT7LosHtl/FnpTjASkUp3LF0d6cPTgeLsKbK/xJ06uq5gaKvG8Q5zXq6Jbxv+STJdEgmxCf1SPAXViD1PIiGLt2B24qZyOtsSpTSnM5cQuLAvr/6xZG7GYkCU7PRADMGFUm3Xg6L3vRUU3h6vaddoMBAW9ENXVaym1eN5aax3x4tLNUp+kerM+kb/Ab/mi01+PfutPKTptP/dqEGZuKmVrGdX9A+s2Wo6sPtSl85NJT+HT+SSrROvGbx4GH3d6MSHx71JSzy+dph46LV3brBMzY/2xvLbIuPVHqniL/Y0bsUke6aD9cfXIa4UBi7TiKBuoKJYqoYa/VgdoqB4yDaczAnzzYXov7thvPL1Rwv5TueNsPSrQbXbvEJUDxRazlLIrGLuYzeGrnbFHOTM8KKpSVnE8uiXiSEW31DRNHXyLImklMHjwtGd4sjZD5EfkUcg1v9gVCu80ggT+/l7SflY07DOLFvS1ii2ZUPu3IjcbyPtlFj6pGUYjMbIZj8AdqIKyMh6IWtbsu6TMC2yEPSk5pwXrEf7M89nIfHtuhZio+mZ0MhGyHos3nv51/dDBKQnEtcJiODik24kI3JTMGnfQsp7IMjECAwEAAaMyMDAwHQYDVR0OBBYEFFUq5ihhM0we5AVYMhcmFpT6wUKMMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAFQvpu2xTTenJ6N6YiRWxJ1cwH673yEt60lfsF/xncTeD79qdjD371b1GzQtcYZtYuSdgajGG4YZ8gBrwthm2fOcfuWK2VRDOe7/++mJVEvvsUzzexNeB5nZCYuu1N4UA7z8RHJy6ycPTTcelqyMKUjAGTCZa2BQhkxoFq+wBrEZrY975RcEe7bNNWg0S8YpvdKXxwy/gDZUoWyWXvgmDFQ6VjzDk3jJb0fonxnP/9F7sjd1uU2t5d6aQdPXzbzgWC/IKRXpfdIIZe15uHs1o1O909ymViRRsyy36cjwZ1M2snHWsU7vO//CptldBoV6k6bKkvXA23Cg1vUT0mj0MW554Vb20afxPhyWqHQa4ffHspH2HxViicHx9YaD+WjNAER0Skdo7/sxVR9Ozms2kb8Tyd18mwtVvwmlBNdtwsw8MX9PeW0AXlJUXkHkj47TVP+yyv1dKdUaGZq+ErPjiGoQGBCeHrrtGh+WryK38T7huLnpt++Q4U+CJ6+u9Mvd+C7MCZmgsO9sn0fTL/z54j3zBaWZoRcUZg8IZ7U+C5eGCrg9VjubVdYSar5CrCQnw8x2Rl63qjLVOwpiRoNnEXxmE23yyx1hkP8r27EcTbH7PpJHI22khScfDhf0X/99HEaBqcs+GI+YnC5dpPHY9koTdT5JckCfPJ9sprOn9Ble"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2053895810.00000000033EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000007.00000002.2145144757.0000000003017000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000003.00000002.2070881360.0000000000720000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000006.00000002.2098856236.0000000002BAC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            6.2.workbook.exe.2bacc80.1.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
              0.2.doc_Zapytanie - Oferta KH 09281.com.exe.33eccc8.0.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                    • 0x28ef4d:$x1: Quasar.Common.Messages
                    • 0x29f276:$x1: Quasar.Common.Messages
                    • 0x2ab83a:$x4: Uninstalling... good bye :-(
                    • 0x2ad02f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                    Click to see the 20 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\workbook.exe, ParentProcessId: 6204, ParentProcessName: workbook.exe, ProcessCommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, ProcessId: 6488, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe", ParentImage: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe, ParentProcessId: 1560, ParentProcessName: doc_Zapytanie - Oferta KH 09281.com.exe, ProcessCommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, ProcessId: 4836, ProcessName: schtasks.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-10T10:06:11.627493+020020355951Domain Observed Used for C2 Detected213.159.74.809792192.168.2.549709TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-10T10:06:11.627493+020020276191Domain Observed Used for C2 Detected213.159.74.809792192.168.2.549709TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 7.2.workbook.exe.905fe58.3.raw.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;", "SubDirectory": "SubDir", "InstallName": "workbook.exe", "MutexName": "0235e291-5d04-4fa3-932c-869aeec51499", "StartupKey": "workbook", "Tag": "Long Leg", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                    Source: twart.myfirewall.orgVirustotal: Detection: 10%Perma Link
                    Source: twart.myfirewall.orgVirustotal: Detection: 10%Perma Link
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeReversingLabs: Detection: 13%
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeVirustotal: Detection: 27%Perma Link
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeVirustotal: Detection: 27%Perma Link
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeReversingLabs: Detection: 13%
                    Source: Yara matchFile source: 6.2.workbook.exe.2bacc80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.33eccc8.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2053895810.00000000033EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2145144757.0000000003017000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2070881360.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2098856236.0000000002BAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 3556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 1560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5064, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6204, type: MEMORYSTR
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.5:49711 version: TLS 1.2
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: kmrq.pdbSHA256F source: doc_Zapytanie - Oferta KH 09281.com.exe, workbook.exe.3.dr
                    Source: Binary string: kmrq.pdb source: doc_Zapytanie - Oferta KH 09281.com.exe, workbook.exe.3.dr

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 213.159.74.80:9792 -> 192.168.2.5:49709
                    Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 213.159.74.80:9792 -> 192.168.2.5:49709
                    Source: Malware configuration extractorURLs: twart.myfirewall.org
                    Source: Yara matchFile source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.5:49709 -> 213.159.74.80:9792
                    Source: Joe Sandbox ViewIP Address: 213.159.74.80 213.159.74.80
                    Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                    Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                    Source: Joe Sandbox ViewASN Name: CTINET-ASCTINETAutonomousSystemRU CTINET-ASCTINETAutonomousSystemRU
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: ipwho.is
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: twart.myfirewall.org
                    Source: global trafficDNS traffic detected: DNS query: ipwho.is
                    Source: workbook.exe, 00000008.00000002.4514405749.0000000005B28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
                    Source: workbook.exe, 00000008.00000002.4494264091.0000000001565000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: workbook.exe, 00000008.00000002.4513857508.0000000005A50000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.8.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: workbook.exe, 00000008.00000002.4497355884.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                    Source: workbook.exe, 00000008.00000002.4497355884.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.isd
                    Source: workbook.exe, 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                    Source: workbook.exe, 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/d
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2083425551.0000000003021000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4497355884.00000000032BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, workbook.exe.3.drString found in binary or memory: http://tempuri.org/ADWRBWWQNJ.xsd
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: workbook.exe, 00000008.00000002.4497355884.0000000003464000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4497355884.0000000003464000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is/
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4497355884.00000000032E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.5:49711 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\workbook.exeJump to behavior

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 6.2.workbook.exe.2bacc80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.33eccc8.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2053895810.00000000033EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2145144757.0000000003017000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2070881360.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2098856236.0000000002BAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 3556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 1560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5064, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6204, type: MEMORYSTR

                    System Summary

                    barindex
                    Source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: initial sampleStatic PE information: Filename: doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_015FD4240_2_015FD424
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_03205D980_2_03205D98
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_032029E00_2_032029E0
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_032000070_2_03200007
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_032000400_2_03200040
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_032020B00_2_032020B0
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_03201C680_2_03201C68
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_032004690_2_03200469
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_032004780_2_03200478
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_03201C780_2_03201C78
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 0_2_032044A00_2_032044A0
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 3_2_012CF03C3_2_012CF03C
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 3_2_053E90683_2_053E9068
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 3_2_053E20D03_2_053E20D0
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 3_2_053E05183_2_053E0518
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 3_2_053E050B3_2_053E050B
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeCode function: 3_2_053E9EE03_2_053E9EE0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_00E3D4246_2_00E3D424
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC5D986_2_04BC5D98
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC44A06_2_04BC44A0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC04786_2_04BC0478
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC1C786_2_04BC1C78
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC1C686_2_04BC1C68
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC04696_2_04BC0469
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC20B06_2_04BC20B0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC00406_2_04BC0040
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_04BC29E06_2_04BC29E0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05077C306_2_05077C30
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_050700786_2_05070078
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_050700886_2_05070088
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05077C206_2_05077C20
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_014AD4247_2_014AD424
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E15C807_2_02E15C80
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E120A07_2_02E120A0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E120B07_2_02E120B0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E100407_2_02E10040
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E129E07_2_02E129E0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E104697_2_02E10469
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E11C687_2_02E11C68
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E104787_2_02E10478
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_02E11C787_2_02E11C78
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_0308F03C8_2_0308F03C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_0828B6E08_2_0828B6E0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08287E488_2_08287E48
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 11_2_0184F03C11_2_0184F03C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 11_2_058F3CE811_2_058F3CE8
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000000.2030255412.0000000000EA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekmrq.exe@ vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2053290340.00000000016CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2053895810.00000000033EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2053895810.00000000033EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2053895810.00000000033A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062081256.0000000007600000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000720000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeBinary or memory string: OriginalFilenamekmrq.exe@ vs doc_Zapytanie - Oferta KH 09281.com.exe
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/5@2/2
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\doc_Zapytanie - Oferta KH 09281.com.exe.logJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2136:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMutant created: \Sessions\1\BaseNamedObjects\Local\0235e291-5d04-4fa3-932c-869aeec51499
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7120:120:WilError_03
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeVirustotal: Detection: 27%
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeReversingLabs: Detection: 13%
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeFile read: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe "C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe"
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe "C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe"
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe "C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptnet.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cabinet.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic file information: File size 3863552 > 1048576
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3ae800
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: kmrq.pdbSHA256F source: doc_Zapytanie - Oferta KH 09281.com.exe, workbook.exe.3.dr
                    Source: Binary string: kmrq.pdb source: doc_Zapytanie - Oferta KH 09281.com.exe, workbook.exe.3.dr

                    Data Obfuscation

                    barindex
                    Source: doc_Zapytanie - Oferta KH 09281.com.exe, MainForm.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: doc_Zapytanie - Oferta KH 09281.com.exeStatic PE information: 0x82361C0D [Thu Mar 24 12:56:45 2039 UTC]
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_0828892D push 0000005Eh; iretd 8_2_082889F6
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_082889F7 push 0000005Eh; iretd 8_2_082889F6
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08288A6C push 0000005Eh; iretd 8_2_08288ADE
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08288ADF push 0000005Eh; iretd 8_2_08288ADE
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08281BF1 push 0000005Eh; iretd 8_2_08281C1E
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08281CEF push 0000005Eh; iretd 8_2_08281D06
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08281D07 push 0000005Eh; iretd 8_2_08281DEE
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08281E6A push 0000005Eh; iretd 8_2_08281ED6
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeFile created: C:\Users\user\AppData\Roaming\SubDir\workbook.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeFile opened: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 3556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5064, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6076, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: 15F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: 33A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: 31A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: 8C90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: 7670000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: A0F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: B0F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: B4B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: 3020000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: 14F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 4B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 7ED0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 8ED0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 94F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A4F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A870000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 1460000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 2FA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 8500000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 72C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 9860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 32B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 1840000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 32E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 52E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 4059Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 5631Jump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe TID: 1568Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe TID: 4140Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 1532Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 6768Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 2820Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 6152Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 2352Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: workbook.exe, 00000008.00000002.4525854592.0000000007607000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: workbook.exe, 00000008.00000002.4513857508.0000000005A50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0b
                    Source: workbook.exe, 00000008.00000002.4514405749.0000000005B28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWyp\
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeMemory written: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\workbook.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\workbook.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe "C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 6.2.workbook.exe.2bacc80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.33eccc8.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2053895810.00000000033EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2145144757.0000000003017000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2070881360.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2098856236.0000000002BAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 3556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 1560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5064, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6204, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 6.2.workbook.exe.2bacc80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.33eccc8.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.doc_Zapytanie - Oferta KH 09281.com.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.workbook.exe.905fe58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.doc_Zapytanie - Oferta KH 09281.com.exe.471bd40.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2053895810.00000000033EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2145144757.0000000003017000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2070881360.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2098856236.0000000002BAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 3556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: doc_Zapytanie - Oferta KH 09281.com.exe PID: 1560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5064, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6204, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Windows Management Instrumentation
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Masquerading
                    11
                    Input Capture
                    1
                    Query Registry
                    Remote Services11
                    Input Capture
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    LSASS Memory111
                    Security Software Discovery
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    41
                    Virtualization/Sandbox Evasion
                    Security Account Manager41
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Hidden Files and Directories
                    LSA Secrets1
                    System Network Configuration Discovery
                    SSHKeylogging113
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain Credentials23
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Software Packing
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Timestomp
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    DLL Side-Loading
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1508493 Sample: doc_Zapytanie - Oferta KH 0... Startdate: 10/09/2024 Architecture: WINDOWS Score: 100 42 twart.myfirewall.org 2->42 44 ipwho.is 2->44 46 bg.microsoft.map.fastly.net 2->46 54 Multi AV Scanner detection for domain / URL 2->54 56 Suricata IDS alerts for network traffic 2->56 58 Found malware configuration 2->58 60 10 other signatures 2->60 11 doc_Zapytanie - Oferta KH 09281.com.exe 3 2->11         started        15 workbook.exe 2 2->15         started        signatures3 process4 file5 40 doc_Zapytanie - Of...H 09281.com.exe.log, ASCII 11->40 dropped 66 Injects a PE file into a foreign processes 11->66 17 doc_Zapytanie - Oferta KH 09281.com.exe 4 11->17         started        21 workbook.exe 2 15->21         started        signatures6 process7 file8 38 C:\Users\user\AppData\...\workbook.exe, PE32 17->38 dropped 52 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->52 23 workbook.exe 3 17->23         started        26 schtasks.exe 1 17->26         started        signatures9 process10 signatures11 62 Multi AV Scanner detection for dropped file 23->62 64 Injects a PE file into a foreign processes 23->64 28 workbook.exe 15 2 23->28         started        32 conhost.exe 26->32         started        process12 dnsIp13 48 twart.myfirewall.org 213.159.74.80, 49709, 9792 CTINET-ASCTINETAutonomousSystemRU Russian Federation 28->48 50 ipwho.is 195.201.57.90, 443, 49711 HETZNER-ASDE Germany 28->50 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->68 70 Installs a global keyboard hook 28->70 34 schtasks.exe 1 28->34         started        signatures14 process15 process16 36 conhost.exe 34->36         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    doc_Zapytanie - Oferta KH 09281.com.exe27%VirustotalBrowse
                    doc_Zapytanie - Oferta KH 09281.com.exe13%ReversingLabs
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\SubDir\workbook.exe13%ReversingLabs
                    C:\Users\user\AppData\Roaming\SubDir\workbook.exe27%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    bg.microsoft.map.fastly.net0%VirustotalBrowse
                    ipwho.is0%VirustotalBrowse
                    twart.myfirewall.org10%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://api.ipify.org/0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/14436606/233540%VirustotalBrowse
                    http://tempuri.org/ADWRBWWQNJ.xsd0%Avira URL Cloudsafe
                    http://schemas.datacontract.org/2004/07/d0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/14436606/233540%Avira URL Cloudsafe
                    http://schemas.datacontract.org/2004/07/0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/11564914/23354;0%Avira URL Cloudsafe
                    https://api.ipify.org/0%VirustotalBrowse
                    twart.myfirewall.org0%Avira URL Cloudsafe
                    http://schemas.datacontract.org/2004/07/d0%VirustotalBrowse
                    http://ipwho.isd0%Avira URL Cloudsafe
                    https://ipwho.is0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/2152978/23354sCannot0%Avira URL Cloudsafe
                    https://stackoverflow.com/q/11564914/23354;0%VirustotalBrowse
                    http://schemas.datacontract.org/2004/07/0%VirustotalBrowse
                    https://ipwho.is/0%Avira URL Cloudsafe
                    http://tempuri.org/ADWRBWWQNJ.xsd1%VirustotalBrowse
                    twart.myfirewall.org10%VirustotalBrowse
                    http://ipwho.is0%Avira URL Cloudsafe
                    http://crl.microsoft.0%Avira URL Cloudsafe
                    https://ipwho.is/0%VirustotalBrowse
                    http://ipwho.is0%VirustotalBrowse
                    http://crl.microsoft.0%VirustotalBrowse
                    https://stackoverflow.com/q/2152978/23354sCannot0%VirustotalBrowse
                    https://ipwho.is0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.210.172
                    truefalseunknown
                    ipwho.is
                    195.201.57.90
                    truefalseunknown
                    twart.myfirewall.org
                    213.159.74.80
                    truetrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    twart.myfirewall.orgtrue
                    • 10%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ipwho.is/false
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.datacontract.org/2004/07/dworkbook.exe, 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/ADWRBWWQNJ.xsddoc_Zapytanie - Oferta KH 09281.com.exe, workbook.exe.3.drfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackoverflow.com/q/14436606/23354doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4497355884.00000000032E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.datacontract.org/2004/07/workbook.exe, 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackoverflow.com/q/11564914/23354;doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ipwho.isdworkbook.exe, 00000008.00000002.4497355884.0000000003476000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ipwho.isworkbook.exe, 00000008.00000002.4497355884.0000000003464000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackoverflow.com/q/2152978/23354sCannotdoc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, doc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namedoc_Zapytanie - Oferta KH 09281.com.exe, 00000003.00000002.2083425551.0000000003021000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4497355884.00000000032BC000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ipwho.isworkbook.exe, 00000008.00000002.4497355884.0000000003476000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.microsoft.workbook.exe, 00000008.00000002.4514405749.0000000005B28000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    213.159.74.80
                    twart.myfirewall.orgRussian Federation
                    13078CTINET-ASCTINETAutonomousSystemRUtrue
                    195.201.57.90
                    ipwho.isGermany
                    24940HETZNER-ASDEfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1508493
                    Start date and time:2024-09-10 10:05:10 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 10m 16s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:14
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:doc_Zapytanie - Oferta KH 09281.com.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@16/5@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 208
                    • Number of non-executed functions: 10
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 199.232.210.172
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    04:06:01API Interceptor1x Sleep call for process: doc_Zapytanie - Oferta KH 09281.com.exe modified
                    04:06:05API Interceptor12784617x Sleep call for process: workbook.exe modified
                    10:06:05Task SchedulerRun new task: workbook path: C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    213.159.74.80doc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                      Client.exeGet hashmaliciousQuasarBrowse
                        rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                          rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                            ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                              Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                  195.201.57.90SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                                  • /?output=json
                                  765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                  • /?output=json
                                  765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                  • /?output=json
                                  WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                                  • /?output=json
                                  ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                                  • ipwhois.app/xml/
                                  cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                  • /?output=json
                                  Clipper.exeGet hashmaliciousUnknownBrowse
                                  • /?output=json
                                  cOQD62FceM.exeGet hashmaliciousLuca StealerBrowse
                                  • /?output=json
                                  Cryptor.exeGet hashmaliciousLuca StealerBrowse
                                  • /?output=json
                                  Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                  • /?output=json
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ipwho.isdoc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                  • 195.201.57.90
                                  bin homebots io.batGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  yJrZoOsgfl.exeGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  IMKssbDprn.exeGet hashmaliciousUnknownBrowse
                                  • 108.181.98.179
                                  WBmC56ADQF.lnkGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  uScqjqUS1m.exeGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  CVSIyqGKKK.exeGet hashmaliciousUnknownBrowse
                                  • 108.181.98.179
                                  Client.exeGet hashmaliciousQuasarBrowse
                                  • 195.201.57.90
                                  AdjustLoader.exeGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                  • 195.201.57.90
                                  bg.microsoft.map.fastly.netSOA.exeGet hashmaliciousFormBookBrowse
                                  • 199.232.210.172
                                  LETTER OF DEMAND.pdfGet hashmaliciousHTMLPhisherBrowse
                                  • 199.232.210.172
                                  https://clf.questionpro.eu/cxportal/login?feedbackId=1602631631Get hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  https://go.skimresources.com/?id=129857X1600501&url=https://www.freelancer.com/users/login-quick.php?token=30b3628412ea618dcc3f414b266ae263302b3e1b43e6d2d885225319dabe8e68&url=https://secure.adnxs.com/seg?redir=https://link.sbstck.com/redirect/298cfa06-ad24-42db-8a85-7a3ca069b2cf?j=eyJ1IjoiNGRnZ2x2In0.IkG1h6SLHR3lrFyuGet hashmaliciousHTMLPhisherBrowse
                                  • 199.232.214.172
                                  https://dl9r8y25t98wv.cloudfront.net/?YS50YW5ndXlAc2JtLm1jGet hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  http://117.176.194.239:8060/OrBitPluginServiceR15/Upgrade/WindowsFormsControlLibrary1.dllGet hashmaliciousUnknownBrowse
                                  • 199.232.214.172
                                  https://dev-owaserv.pantheonsite.io/auth/?email=*@index.shtmlindex.shtml?code=105145d3e057663131503877b5102ed4786ce1790639df67b80662c0910934b9cb6a3b4145df9f53c74dbffec3e673d99215bbfcf2f5cfa23784f8cf995f10d98d180a3a72929bb118e2374079a4a9e43f65d534532f56b6d1704020291abc40b998f8ba2bc3ffc433df5f4285ff9f9d81725bindex.shtml/Get hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  https://mostacho.ru.com/index.phpGet hashmaliciousUnknownBrowse
                                  • 199.232.214.172
                                  https://kby.oqp.mybluehost.me/wp-admin/20191952407230/account/amendes2024orgGet hashmaliciousUnknownBrowse
                                  • 199.232.214.172
                                  http://whats.met-esm.top/Get hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  twart.myfirewall.orgdoc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  Client.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                  • 213.159.74.80
                                  doc_RFQ NEW ORDER #2400228341.pdf.exeGet hashmaliciousAsyncRATBrowse
                                  • 41.151.251.119
                                  doc_Rfq_TNTM #U00daj rend TM00002916620 exp_pdf.exeGet hashmaliciousXWormBrowse
                                  • 103.35.191.158
                                  6KfY269eO6.exeGet hashmaliciousLodaRATBrowse
                                  • 103.35.191.158
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  HETZNER-ASDEAviso pago_inv08122047.shtmlGet hashmaliciousUnknownBrowse
                                  • 116.202.95.229
                                  r3SKZgalaR.exeGet hashmaliciousUnknownBrowse
                                  • 128.140.55.152
                                  RFQ_0230909024SEPT.xla.xlsxGet hashmaliciousRemcosBrowse
                                  • 95.217.202.210
                                  xrrwwstCMd.docxGet hashmaliciousRemcosBrowse
                                  • 95.217.202.210
                                  myfile.exeGet hashmaliciousSodinokibi, Chaos, Netwalker, Revil, TrojanRansomBrowse
                                  • 188.40.30.106
                                  doc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                  • 195.201.57.90
                                  Quotation.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 135.181.160.46
                                  uD9I18eLZ6.exeGet hashmaliciousPureLog Stealer, Raccoon Stealer v2, RedLine, zgRATBrowse
                                  • 116.203.232.114
                                  http://pratikg7028.github.io/Task4Get hashmaliciousHTMLPhisherBrowse
                                  • 78.46.22.25
                                  IDMan.exeGet hashmaliciousFredy StealerBrowse
                                  • 5.161.243.5
                                  CTINET-ASCTINETAutonomousSystemRUdoc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  Client.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                  • 213.159.74.80
                                  4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                  • 213.159.74.80
                                  yEL4yMV0s4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                  • 213.159.64.146
                                  AGREEMENT AND APPROVAL REPORT FECRWY RN & FR OF 2024-501144_6.5.24.pdfGet hashmaliciousHTMLPhisherBrowse
                                  • 213.159.64.109
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0ehttps://go.skimresources.com/?id=129857X1600501&url=https://www.freelancer.com/users/login-quick.php?token=30b3628412ea618dcc3f414b266ae263302b3e1b43e6d2d885225319dabe8e68&url=https://secure.adnxs.com/seg?redir=https://link.sbstck.com/redirect/298cfa06-ad24-42db-8a85-7a3ca069b2cf?j=eyJ1IjoiNGRnZ2x2In0.IkG1h6SLHR3lrFyuGet hashmaliciousHTMLPhisherBrowse
                                  • 195.201.57.90
                                  https://dl9r8y25t98wv.cloudfront.net/?YS50YW5ndXlAc2JtLm1jGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  MALED_Q88_10.09.24.doc.scr.exeGet hashmaliciousAgentTeslaBrowse
                                  • 195.201.57.90
                                  HelperLibrary.ps1Get hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  Q88_MT Carol 2024.09.10.doc.scr.exeGet hashmaliciousAgentTeslaBrowse
                                  • 195.201.57.90
                                  iBypass LPro A12+.exeGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  iBypass LPro A12+.exeGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  SecuriteInfo.com.Trojan.PackedNET.3050.5454.27030.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 195.201.57.90
                                  r3SKZgalaR.exeGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  https://mostacho.ru.com/index.phpGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  No context
                                  Process:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                  Category:dropped
                                  Size (bytes):71954
                                  Entropy (8bit):7.996617769952133
                                  Encrypted:true
                                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                  Process:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):328
                                  Entropy (8bit):3.2418003062782916
                                  Encrypted:false
                                  SSDEEP:6:kK5a/L9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:giDImsLNkPlE99SNxAhUe/3
                                  MD5:1CDC4C7FCB68658DE45A23775177A2F7
                                  SHA1:1B3761EBAF4972523E7E502E6362BBBE13D3C40A
                                  SHA-256:E158B0EAA87269D30A476163909C5141AA6F889D72348308960DBFDAE9E5180C
                                  SHA-512:8169410B1DBAFE7B41CA0202C1645B2A4E1048C72D5E9F0B015A7828A071E35B80DAD1310C696D66A2A8CF806325C583CF672CD3725853C61C332B55A6DB5BA2
                                  Malicious:false
                                  Reputation:low
                                  Preview:p...... ..........x.X...(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                  Process:C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1216
                                  Entropy (8bit):5.34331486778365
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                  Process:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1216
                                  Entropy (8bit):5.34331486778365
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                  Process:C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):3863552
                                  Entropy (8bit):7.963670649250203
                                  Encrypted:false
                                  SSDEEP:49152:cfMJOv6Id+/vm1z5O2W925nAkOvFNhRg6Zuzzt1TjmFPJBld+3Y81SUAbaYgrL8z:ckoSYGu15jWqQvbUN125JKrAbabB0
                                  MD5:D5DEF75143E3302847F9E6F64A1CAD4E
                                  SHA1:8C914DD231DAFF31092BF5DE3DB22EB9C07C622D
                                  SHA-256:F9FE40CA4D842619322A11C4013A2210132D4C7AFA0C4AE88BE17F13EE6D1B16
                                  SHA-512:584B1C2437140B4916A34F34FD5EFF93CADF0E7C4CE00AA509FB25758D633A75E5E6B64FB585FAFD0EE5E0AC38E8D03391D8E7C39F8F57F7E4BD0CC388DCFE81
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 13%
                                  • Antivirus: Virustotal, Detection: 27%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....6...............0...:...........;.. ... ;...@.. .......................`;...........@...................................;.O.... ;.,....................@;.......:.p............................................ ............... ..H............text.....:.. ....:................. ..`.rsrc...,.... ;.......:.............@..@.reloc.......@;.......:.............@..B..................;.....H.......,P...X......q...<...`.8..........................................0..L.........}.....(.......(......(........0...s......( ....o!.....("....o#.....($....*.0..+.........}........(%........(&.....,5...(........0...s......(.....o!.....(.....o#....8.....r...p.`...('...o(...t`.......()..........9d....s.........s*...s+...o,......o ...r...po-..........,$..( .....o ...r...po-...s....o........o ...r+..po-..........,$..( .....o ...r+..po-...s....o........o ...rC..po-..........,$.
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.963670649250203
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:doc_Zapytanie - Oferta KH 09281.com.exe
                                  File size:3'863'552 bytes
                                  MD5:d5def75143e3302847f9e6f64a1cad4e
                                  SHA1:8c914dd231daff31092bf5de3db22eb9c07c622d
                                  SHA256:f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16
                                  SHA512:584b1c2437140b4916a34f34fd5eff93cadf0e7c4ce00aa509fb25758d633a75e5e6b64fb585fafd0ee5e0ac38e8d03391d8e7c39f8f57f7e4bd0cc388dcfe81
                                  SSDEEP:49152:cfMJOv6Id+/vm1z5O2W925nAkOvFNhRg6Zuzzt1TjmFPJBld+3Y81SUAbaYgrL8z:ckoSYGu15jWqQvbUN125JKrAbabB0
                                  TLSH:860623131BD8C959C1BAD2B466AAC1300B76DE0BF8A3D376DEC1E9D33E15321AD0574A
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....6...............0...:...........;.. ... ;...@.. .......................`;...........@................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x7b0706
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x82361C0D [Thu Mar 24 12:56:45 2039 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3b06b40x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b20000x62c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x3b40000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x3ab59c0x70.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x3ae70c0x3ae8003b565b359e94e443836cbee6bcec68b2unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x3b20000x62c0x80089cd2bcd6456e0f3d9913e7c69040afeFalse0.33837890625data3.46497434020257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x3b40000xc0x200b9e17dec0b80900eda76118493ab561bFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x3b20900x39cdata0.42207792207792205
                                  RT_MANIFEST0x3b243c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-09-10T10:06:11.627493+02002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)1213.159.74.809792192.168.2.549709TCP
                                  2024-09-10T10:06:11.627493+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert1213.159.74.809792192.168.2.549709TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Sep 10, 2024 10:06:10.367732048 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:10.373444080 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:10.373528004 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:10.400552988 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:10.405715942 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:11.617322922 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:11.617348909 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:11.617441893 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:11.622612000 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:11.627492905 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:11.724909067 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:11.860805035 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:11.966264009 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:11.966439009 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:12.931309938 CEST49711443192.168.2.5195.201.57.90
                                  Sep 10, 2024 10:06:12.931346893 CEST44349711195.201.57.90192.168.2.5
                                  Sep 10, 2024 10:06:12.931418896 CEST49711443192.168.2.5195.201.57.90
                                  Sep 10, 2024 10:06:12.932303905 CEST49711443192.168.2.5195.201.57.90
                                  Sep 10, 2024 10:06:12.932317019 CEST44349711195.201.57.90192.168.2.5
                                  Sep 10, 2024 10:06:13.790040016 CEST44349711195.201.57.90192.168.2.5
                                  Sep 10, 2024 10:06:13.790124893 CEST49711443192.168.2.5195.201.57.90
                                  Sep 10, 2024 10:06:13.793839931 CEST49711443192.168.2.5195.201.57.90
                                  Sep 10, 2024 10:06:13.793853045 CEST44349711195.201.57.90192.168.2.5
                                  Sep 10, 2024 10:06:13.794080973 CEST44349711195.201.57.90192.168.2.5
                                  Sep 10, 2024 10:06:13.799444914 CEST49711443192.168.2.5195.201.57.90
                                  Sep 10, 2024 10:06:13.847423077 CEST44349711195.201.57.90192.168.2.5
                                  Sep 10, 2024 10:06:13.994381905 CEST44349711195.201.57.90192.168.2.5
                                  Sep 10, 2024 10:06:13.994460106 CEST44349711195.201.57.90192.168.2.5
                                  Sep 10, 2024 10:06:13.994508028 CEST49711443192.168.2.5195.201.57.90
                                  Sep 10, 2024 10:06:14.047632933 CEST49711443192.168.2.5195.201.57.90
                                  Sep 10, 2024 10:06:14.215007067 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:14.571158886 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:15.151449919 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:15.151469946 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:15.261044025 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:15.313862085 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:15.348113060 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:06:15.391995907 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:40.360882998 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:06:40.368875027 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:07:05.376503944 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:07:05.381417036 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:07:30.388959885 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:07:30.393893003 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:07:55.407767057 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:07:55.413057089 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:08:20.423410892 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:08:20.428747892 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:08:45.439055920 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:08:45.443995953 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:09:10.454838037 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:09:10.460005999 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:09:35.470362902 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:09:35.475414038 CEST979249709213.159.74.80192.168.2.5
                                  Sep 10, 2024 10:10:00.486008883 CEST497099792192.168.2.5213.159.74.80
                                  Sep 10, 2024 10:10:00.491162062 CEST979249709213.159.74.80192.168.2.5
                                  TimestampSource PortDest PortSource IPDest IP
                                  Sep 10, 2024 10:06:10.294033051 CEST4960053192.168.2.51.1.1.1
                                  Sep 10, 2024 10:06:10.305733919 CEST53496001.1.1.1192.168.2.5
                                  Sep 10, 2024 10:06:12.920706034 CEST5123853192.168.2.51.1.1.1
                                  Sep 10, 2024 10:06:12.927690983 CEST53512381.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Sep 10, 2024 10:06:10.294033051 CEST192.168.2.51.1.1.10x8ae4Standard query (0)twart.myfirewall.orgA (IP address)IN (0x0001)false
                                  Sep 10, 2024 10:06:12.920706034 CEST192.168.2.51.1.1.10xc7ffStandard query (0)ipwho.isA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Sep 10, 2024 10:06:10.305733919 CEST1.1.1.1192.168.2.50x8ae4No error (0)twart.myfirewall.org213.159.74.80A (IP address)IN (0x0001)false
                                  Sep 10, 2024 10:06:12.177741051 CEST1.1.1.1192.168.2.50xf71bNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                  Sep 10, 2024 10:06:12.177741051 CEST1.1.1.1192.168.2.50xf71bNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                  Sep 10, 2024 10:06:12.927690983 CEST1.1.1.1192.168.2.50xc7ffNo error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                                  • ipwho.is
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549711195.201.57.904436204C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  TimestampBytes transferredDirectionData
                                  2024-09-10 08:06:13 UTC150OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                  Host: ipwho.is
                                  Connection: Keep-Alive
                                  2024-09-10 08:06:13 UTC223INHTTP/1.1 200 OK
                                  Date: Tue, 10 Sep 2024 08:06:13 GMT
                                  Content-Type: application/json; charset=utf-8
                                  Transfer-Encoding: chunked
                                  Connection: close
                                  Server: ipwhois
                                  Access-Control-Allow-Headers: *
                                  X-Robots-Tag: noindex
                                  2024-09-10 08:06:13 UTC1019INData Raw: 33 65 66 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72
                                  Data Ascii: 3ef{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.33", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yor


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:04:06:00
                                  Start date:10/09/2024
                                  Path:C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe"
                                  Imagebase:0xaf0000
                                  File size:3'863'552 bytes
                                  MD5 hash:D5DEF75143E3302847F9E6F64A1CAD4E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2053895810.00000000033EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2062600325.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2055940547.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:3
                                  Start time:04:06:02
                                  Start date:10/09/2024
                                  Path:C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\doc_Zapytanie - Oferta KH 09281.com.exe"
                                  Imagebase:0x740000
                                  File size:3'863'552 bytes
                                  MD5 hash:D5DEF75143E3302847F9E6F64A1CAD4E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.2070881360.0000000000720000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.2070881360.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:4
                                  Start time:04:06:04
                                  Start date:10/09/2024
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:"schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                                  Imagebase:0x850000
                                  File size:187'904 bytes
                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:04:06:04
                                  Start date:10/09/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:04:06:04
                                  Start date:10/09/2024
                                  Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                  Imagebase:0x7ff6d64d0000
                                  File size:3'863'552 bytes
                                  MD5 hash:D5DEF75143E3302847F9E6F64A1CAD4E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000002.2098856236.0000000002BAC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 13%, ReversingLabs
                                  • Detection: 27%, Virustotal, Browse
                                  Reputation:low
                                  Has exited:true

                                  Target ID:7
                                  Start time:04:06:05
                                  Start date:10/09/2024
                                  Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  Imagebase:0x740000
                                  File size:3'863'552 bytes
                                  MD5 hash:D5DEF75143E3302847F9E6F64A1CAD4E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2145144757.0000000003017000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2194510600.000000000A061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2188441156.000000000905F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:8
                                  Start time:04:06:06
                                  Start date:10/09/2024
                                  Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                  Imagebase:0xb50000
                                  File size:3'863'552 bytes
                                  MD5 hash:D5DEF75143E3302847F9E6F64A1CAD4E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000008.00000002.4497355884.00000000034C3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:9
                                  Start time:04:06:08
                                  Start date:10/09/2024
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:"schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                                  Imagebase:0x850000
                                  File size:187'904 bytes
                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:10
                                  Start time:04:06:08
                                  Start date:10/09/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:11
                                  Start time:04:06:11
                                  Start date:10/09/2024
                                  Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                  Imagebase:0xc20000
                                  File size:3'863'552 bytes
                                  MD5 hash:D5DEF75143E3302847F9E6F64A1CAD4E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:11.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:2.3%
                                    Total number of Nodes:176
                                    Total number of Limit Nodes:12
                                    execution_graph 21230 3203712 21231 3203718 21230->21231 21236 3204140 21231->21236 21241 32041b6 21231->21241 21248 3204150 21231->21248 21232 3203729 21237 3204150 21236->21237 21253 32044a0 21237->21253 21270 3204461 21237->21270 21238 3204172 21238->21232 21243 3204144 21241->21243 21245 32041b9 21241->21245 21242 32040fa 21242->21232 21243->21242 21246 32044a0 12 API calls 21243->21246 21247 3204461 12 API calls 21243->21247 21244 3204172 21244->21232 21246->21244 21247->21244 21249 320416a 21248->21249 21251 32044a0 12 API calls 21249->21251 21252 3204461 12 API calls 21249->21252 21250 3204172 21250->21232 21251->21250 21252->21250 21254 32044a6 21253->21254 21255 3204459 21253->21255 21263 3204497 21255->21263 21286 3204583 21255->21286 21291 320491f 21255->21291 21295 32047bf 21255->21295 21300 320461e 21255->21300 21305 320467c 21255->21305 21311 3204a3b 21255->21311 21319 32045b8 21255->21319 21324 3204715 21255->21324 21329 3204750 21255->21329 21334 3204a8f 21255->21334 21338 320464f 21255->21338 21343 3204e4c 21255->21343 21347 3204f48 21255->21347 21263->21238 21271 3204485 21270->21271 21272 3204583 2 API calls 21271->21272 21273 3204f48 2 API calls 21271->21273 21274 3204e4c 2 API calls 21271->21274 21275 320464f 2 API calls 21271->21275 21276 3204a8f 2 API calls 21271->21276 21277 3204750 2 API calls 21271->21277 21278 3204715 2 API calls 21271->21278 21279 3204497 21271->21279 21280 32045b8 2 API calls 21271->21280 21281 3204a3b 4 API calls 21271->21281 21282 320467c 2 API calls 21271->21282 21283 320461e 2 API calls 21271->21283 21284 32047bf 2 API calls 21271->21284 21285 320491f 2 API calls 21271->21285 21272->21279 21273->21279 21274->21279 21275->21279 21276->21279 21277->21279 21278->21279 21279->21238 21280->21279 21281->21279 21282->21279 21283->21279 21284->21279 21285->21279 21287 32045bc 21286->21287 21351 3203238 21287->21351 21355 320322e 21287->21355 21359 3202e12 21291->21359 21363 3202e18 21291->21363 21292 3204939 21296 32047d7 21295->21296 21367 3202fb0 21296->21367 21371 3202faa 21296->21371 21297 32047f8 21297->21263 21301 3204584 21300->21301 21303 3203238 CreateProcessA 21301->21303 21304 320322e CreateProcessA 21301->21304 21302 32046c2 21302->21263 21303->21302 21304->21302 21307 3204682 21305->21307 21306 3205118 21307->21306 21309 3203238 CreateProcessA 21307->21309 21310 320322e CreateProcessA 21307->21310 21308 32046c2 21308->21263 21309->21308 21310->21308 21375 3205220 21311->21375 21380 320520f 21311->21380 21312 32047d7 21313 3204e0f 21312->21313 21315 3202fb0 WriteProcessMemory 21312->21315 21316 3202faa WriteProcessMemory 21312->21316 21313->21263 21314 32047f8 21314->21263 21315->21314 21316->21314 21320 32045be 21319->21320 21322 3203238 CreateProcessA 21320->21322 21323 320322e CreateProcessA 21320->21323 21321 32046c2 21321->21263 21322->21321 21323->21321 21325 3204722 21324->21325 21393 3202928 21325->21393 21397 3202930 21325->21397 21326 3204de3 21330 3204ba8 21329->21330 21332 3202e12 Wow64SetThreadContext 21330->21332 21333 3202e18 Wow64SetThreadContext 21330->21333 21331 3204b39 21331->21263 21332->21331 21333->21331 21336 3202fb0 WriteProcessMemory 21334->21336 21337 3202faa WriteProcessMemory 21334->21337 21335 3204ab7 21335->21263 21336->21335 21337->21335 21339 3204652 21338->21339 21341 3203238 CreateProcessA 21339->21341 21342 320322e CreateProcessA 21339->21342 21340 32046c2 21340->21263 21341->21340 21342->21340 21401 32030a0 21343->21401 21405 3203098 21343->21405 21344 3204e6e 21349 3202fb0 WriteProcessMemory 21347->21349 21350 3202faa WriteProcessMemory 21347->21350 21348 3204f76 21349->21348 21350->21348 21352 32032c1 CreateProcessA 21351->21352 21354 3203483 21352->21354 21356 3203238 CreateProcessA 21355->21356 21358 3203483 21356->21358 21360 3202e18 Wow64SetThreadContext 21359->21360 21362 3202ea5 21360->21362 21362->21292 21364 3202e5d Wow64SetThreadContext 21363->21364 21366 3202ea5 21364->21366 21366->21292 21368 3202ff8 WriteProcessMemory 21367->21368 21370 320304f 21368->21370 21370->21297 21372 3202fb0 WriteProcessMemory 21371->21372 21374 320304f 21372->21374 21374->21297 21376 3205235 21375->21376 21385 3202ef0 21376->21385 21389 3202eea 21376->21389 21377 3205254 21377->21312 21381 3205220 21380->21381 21383 3202ef0 VirtualAllocEx 21381->21383 21384 3202eea VirtualAllocEx 21381->21384 21382 3205254 21382->21312 21383->21382 21384->21382 21386 3202f30 VirtualAllocEx 21385->21386 21388 3202f6d 21386->21388 21388->21377 21390 3202ef0 VirtualAllocEx 21389->21390 21392 3202f6d 21390->21392 21392->21377 21394 3202930 ResumeThread 21393->21394 21396 32029a1 21394->21396 21396->21326 21398 3202970 ResumeThread 21397->21398 21400 32029a1 21398->21400 21400->21326 21402 32030eb ReadProcessMemory 21401->21402 21404 320312f 21402->21404 21404->21344 21406 32030a0 ReadProcessMemory 21405->21406 21408 320312f 21406->21408 21408->21344 21205 15fd4f8 21206 15fd53e GetCurrentProcess 21205->21206 21208 15fd589 21206->21208 21209 15fd590 GetCurrentThread 21206->21209 21208->21209 21210 15fd5cd GetCurrentProcess 21209->21210 21211 15fd5c6 21209->21211 21212 15fd603 21210->21212 21211->21210 21213 15fd62b GetCurrentThreadId 21212->21213 21214 15fd65c 21213->21214 21409 15f4668 21410 15f467a 21409->21410 21411 15f4686 21410->21411 21413 15f4778 21410->21413 21414 15f479d 21413->21414 21418 15f4878 21414->21418 21422 15f4888 21414->21422 21415 15f47a7 21415->21411 21419 15f48af 21418->21419 21420 15f498c 21419->21420 21426 15f44e4 21419->21426 21420->21415 21423 15f48af 21422->21423 21424 15f498c 21423->21424 21425 15f44e4 CreateActCtxA 21423->21425 21424->21415 21425->21424 21427 15f5918 CreateActCtxA 21426->21427 21429 15f59db 21427->21429 21215 3205368 21216 32054f3 21215->21216 21218 320538e 21215->21218 21218->21216 21219 320135c 21218->21219 21220 32055e8 PostMessageW 21219->21220 21221 3205654 21220->21221 21221->21218 21430 3206878 CloseHandle 21431 32068df 21430->21431 21222 15fad70 21223 15fad7f 21222->21223 21225 15fae59 21222->21225 21226 15fae79 21225->21226 21227 15fae9c 21225->21227 21226->21227 21228 15fb0a0 GetModuleHandleW 21226->21228 21227->21223 21229 15fb0cd 21228->21229 21229->21223 21432 15fd740 DuplicateHandle 21433 15fd7d6 21432->21433
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 846f1905ef04f3013d197afc30b90a672030397c83a5e9c80ff5519df13c3cd0
                                    • Instruction ID: 1d9aeb5572cae481ba79526ce1ac1b767a0c604f29fc1b4841ae96b3f529922c
                                    • Opcode Fuzzy Hash: 846f1905ef04f3013d197afc30b90a672030397c83a5e9c80ff5519df13c3cd0
                                    • Instruction Fuzzy Hash: 62E1EB307012068FDB29DB65C454BAEB7FAEFC9700F28446DD14A9B392CB35E986CB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f9f2ef678149446e8252cfee46d3cb7cd078a192b9aa0da683148b17ac9e48af
                                    • Instruction ID: 372971d2e455ed48ecbb1218a44bb087af966d2bd60819b4c4b129c6c75af4ab
                                    • Opcode Fuzzy Hash: f9f2ef678149446e8252cfee46d3cb7cd078a192b9aa0da683148b17ac9e48af
                                    • Instruction Fuzzy Hash: EB310A71D193588FDB29CF67C844789BBB6AFCA300F18C0EAC808AB256DB750985CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 510 15fd4e8-15fd587 GetCurrentProcess 514 15fd589-15fd58f 510->514 515 15fd590-15fd5c4 GetCurrentThread 510->515 514->515 516 15fd5cd-15fd601 GetCurrentProcess 515->516 517 15fd5c6-15fd5cc 515->517 518 15fd60a-15fd625 call 15fd6c7 516->518 519 15fd603-15fd609 516->519 517->516 523 15fd62b-15fd65a GetCurrentThreadId 518->523 519->518 524 15fd65c-15fd662 523->524 525 15fd663-15fd6c5 523->525 524->525
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 015FD576
                                    • GetCurrentThread.KERNEL32 ref: 015FD5B3
                                    • GetCurrentProcess.KERNEL32 ref: 015FD5F0
                                    • GetCurrentThreadId.KERNEL32 ref: 015FD649
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 1e4c3ad96178277f3e7828560a299ed326d2b7df0610f64c16513ad54125bf29
                                    • Instruction ID: c97d619aeb12808e545a26d7e35265d6b5d9dbd95955c174c014d93438458bd5
                                    • Opcode Fuzzy Hash: 1e4c3ad96178277f3e7828560a299ed326d2b7df0610f64c16513ad54125bf29
                                    • Instruction Fuzzy Hash: 425145B09013498FDB14DFA9D548BAEBBF1FF49304F248459E109AB2A0D7389944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 532 15fd4f8-15fd587 GetCurrentProcess 536 15fd589-15fd58f 532->536 537 15fd590-15fd5c4 GetCurrentThread 532->537 536->537 538 15fd5cd-15fd601 GetCurrentProcess 537->538 539 15fd5c6-15fd5cc 537->539 540 15fd60a-15fd625 call 15fd6c7 538->540 541 15fd603-15fd609 538->541 539->538 545 15fd62b-15fd65a GetCurrentThreadId 540->545 541->540 546 15fd65c-15fd662 545->546 547 15fd663-15fd6c5 545->547 546->547
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 015FD576
                                    • GetCurrentThread.KERNEL32 ref: 015FD5B3
                                    • GetCurrentProcess.KERNEL32 ref: 015FD5F0
                                    • GetCurrentThreadId.KERNEL32 ref: 015FD649
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 0c9161d59b1d9010f491b5593bd4377ae12adaef55d22d8e84e45b82353b2039
                                    • Instruction ID: 8e6b6537b4943ba2ddbaed3dd5f3773a79e6a2495ee5ba278e35fb08ede5135d
                                    • Opcode Fuzzy Hash: 0c9161d59b1d9010f491b5593bd4377ae12adaef55d22d8e84e45b82353b2039
                                    • Instruction Fuzzy Hash: AA5146B09003098FDB18DFAAD548BAEBBF5FF49304F20845DE119AB360D7389944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 614 320322e-32032cd 617 3203306-3203326 614->617 618 32032cf-32032d9 614->618 625 3203328-3203332 617->625 626 320335f-320338e 617->626 618->617 619 32032db-32032dd 618->619 620 3203300-3203303 619->620 621 32032df-32032e9 619->621 620->617 623 32032eb 621->623 624 32032ed-32032fc 621->624 623->624 624->624 627 32032fe 624->627 625->626 628 3203334-3203336 625->628 632 3203390-320339a 626->632 633 32033c7-3203481 CreateProcessA 626->633 627->620 630 3203338-3203342 628->630 631 3203359-320335c 628->631 634 3203344 630->634 635 3203346-3203355 630->635 631->626 632->633 636 320339c-320339e 632->636 646 3203483-3203489 633->646 647 320348a-3203510 633->647 634->635 635->635 637 3203357 635->637 638 32033a0-32033aa 636->638 639 32033c1-32033c4 636->639 637->631 641 32033ac 638->641 642 32033ae-32033bd 638->642 639->633 641->642 642->642 643 32033bf 642->643 643->639 646->647 657 3203520-3203524 647->657 658 3203512-3203516 647->658 660 3203534-3203538 657->660 661 3203526-320352a 657->661 658->657 659 3203518 658->659 659->657 663 3203548-320354c 660->663 664 320353a-320353e 660->664 661->660 662 320352c 661->662 662->660 665 320355e-3203565 663->665 666 320354e-3203554 663->666 664->663 667 3203540 664->667 668 3203567-3203576 665->668 669 320357c 665->669 666->665 667->663 668->669 671 320357d 669->671 671->671
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0320346E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 5460a79320e90b83c9559753f2f898813abb2c4970b40db23d7a6d270c6d242c
                                    • Instruction ID: 188e92bbe9a70ee986ef8938d8001e8218425d278f203ba6433208a3f25322c7
                                    • Opcode Fuzzy Hash: 5460a79320e90b83c9559753f2f898813abb2c4970b40db23d7a6d270c6d242c
                                    • Instruction Fuzzy Hash: A0A18F75D1061ACFDB14CFA8C881BDDBBB2FF48310F188169D918A7290DB759989CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 672 3203238-32032cd 674 3203306-3203326 672->674 675 32032cf-32032d9 672->675 682 3203328-3203332 674->682 683 320335f-320338e 674->683 675->674 676 32032db-32032dd 675->676 677 3203300-3203303 676->677 678 32032df-32032e9 676->678 677->674 680 32032eb 678->680 681 32032ed-32032fc 678->681 680->681 681->681 684 32032fe 681->684 682->683 685 3203334-3203336 682->685 689 3203390-320339a 683->689 690 32033c7-3203481 CreateProcessA 683->690 684->677 687 3203338-3203342 685->687 688 3203359-320335c 685->688 691 3203344 687->691 692 3203346-3203355 687->692 688->683 689->690 693 320339c-320339e 689->693 703 3203483-3203489 690->703 704 320348a-3203510 690->704 691->692 692->692 694 3203357 692->694 695 32033a0-32033aa 693->695 696 32033c1-32033c4 693->696 694->688 698 32033ac 695->698 699 32033ae-32033bd 695->699 696->690 698->699 699->699 700 32033bf 699->700 700->696 703->704 714 3203520-3203524 704->714 715 3203512-3203516 704->715 717 3203534-3203538 714->717 718 3203526-320352a 714->718 715->714 716 3203518 715->716 716->714 720 3203548-320354c 717->720 721 320353a-320353e 717->721 718->717 719 320352c 718->719 719->717 722 320355e-3203565 720->722 723 320354e-3203554 720->723 721->720 724 3203540 721->724 725 3203567-3203576 722->725 726 320357c 722->726 723->722 724->720 725->726 728 320357d 726->728 728->728
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0320346E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 9d21c9b4ec00a1822e1c3e14bb8a1590a0b7da7701c3dac0e4d68950be90840b
                                    • Instruction ID: 3d8074ccd5a26a0a20c9d60782efb50b42d11c4bab50f552c4bb95530a029858
                                    • Opcode Fuzzy Hash: 9d21c9b4ec00a1822e1c3e14bb8a1590a0b7da7701c3dac0e4d68950be90840b
                                    • Instruction Fuzzy Hash: 94919F75D1061ACFDB14CFA8C8817DDBBB2FF48310F188169D908A7290DB759989CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 729 15fae59-15fae77 730 15fae79-15fae86 call 15fa1c0 729->730 731 15faea3-15faea7 729->731 738 15fae9c 730->738 739 15fae88 730->739 733 15faebb-15faefc 731->733 734 15faea9-15faeb3 731->734 740 15faefe-15faf06 733->740 741 15faf09-15faf17 733->741 734->733 738->731 784 15fae8e call 15fb100 739->784 785 15fae8e call 15fb0f0 739->785 740->741 742 15faf3b-15faf3d 741->742 743 15faf19-15faf1e 741->743 748 15faf40-15faf47 742->748 745 15faf29 743->745 746 15faf20-15faf27 call 15fa1cc 743->746 744 15fae94-15fae96 744->738 747 15fafd8-15fb098 744->747 752 15faf2b-15faf39 745->752 746->752 779 15fb09a-15fb09d 747->779 780 15fb0a0-15fb0cb GetModuleHandleW 747->780 749 15faf49-15faf51 748->749 750 15faf54-15faf5b 748->750 749->750 753 15faf5d-15faf65 750->753 754 15faf68-15faf71 call 15fa1dc 750->754 752->748 753->754 760 15faf7e-15faf83 754->760 761 15faf73-15faf7b 754->761 762 15faf85-15faf8c 760->762 763 15fafa1-15fafae 760->763 761->760 762->763 765 15faf8e-15faf9e call 15fa1ec call 15fa1fc 762->765 769 15fafd1-15fafd7 763->769 770 15fafb0-15fafce 763->770 765->763 770->769 779->780 781 15fb0cd-15fb0d3 780->781 782 15fb0d4-15fb0e8 780->782 781->782 784->744 785->744
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 015FB0BE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 5d73b45c31505895323462415424f7fc462f5050713bf6e0486ad2c776776dfe
                                    • Instruction ID: 850c54056e2c9aa2b381849f6041d60ed546fa9026991deb452eaaa808fb2200
                                    • Opcode Fuzzy Hash: 5d73b45c31505895323462415424f7fc462f5050713bf6e0486ad2c776776dfe
                                    • Instruction Fuzzy Hash: 878167B0A00B068FD724DF29D48479ABBF5FF88700F00892ED59ACBA94D735E845CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 786 15f590d-15f59d9 CreateActCtxA 788 15f59db-15f59e1 786->788 789 15f59e2-15f5a3c 786->789 788->789 796 15f5a3e-15f5a41 789->796 797 15f5a4b-15f5a4f 789->797 796->797 798 15f5a51-15f5a5d 797->798 799 15f5a60 797->799 798->799 801 15f5a61 799->801 801->801
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 015F59C9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: c1c72b0eb2bc8bc650895e86c380f09f7f6b2a3e78a54e8992dc0f072a8c8652
                                    • Instruction ID: b2fb87407e123a348c31b1aa82fb8f5ec8244d373f48909a021b2191ccec9155
                                    • Opcode Fuzzy Hash: c1c72b0eb2bc8bc650895e86c380f09f7f6b2a3e78a54e8992dc0f072a8c8652
                                    • Instruction Fuzzy Hash: EB41E2B0C00719CFDB24CFAAC984B9DBBF1BF89304F20846AD508AB255D775594ACF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 802 15f44e4-15f59d9 CreateActCtxA 805 15f59db-15f59e1 802->805 806 15f59e2-15f5a3c 802->806 805->806 813 15f5a3e-15f5a41 806->813 814 15f5a4b-15f5a4f 806->814 813->814 815 15f5a51-15f5a5d 814->815 816 15f5a60 814->816 815->816 818 15f5a61 816->818 818->818
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 015F59C9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: ba66f44b695665bd0b3b45f099d0e42148f62b0ee557b09b41154236a0b6503b
                                    • Instruction ID: ac94bb41082c38f16e9f9d178b603f84fda4c37d0745fa229581e15f6a0dab92
                                    • Opcode Fuzzy Hash: ba66f44b695665bd0b3b45f099d0e42148f62b0ee557b09b41154236a0b6503b
                                    • Instruction Fuzzy Hash: 934104B0C0071DCBDB24DFA9C848B9DBBF5BF49304F20846AD508AB255DBB56949CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 819 3202faa-3202ffe 822 3203000-320300c 819->822 823 320300e-320304d WriteProcessMemory 819->823 822->823 825 3203056-3203086 823->825 826 320304f-3203055 823->826 826->825
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 03203040
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 23b7885bde61c3d44e42c376b76e0d35f828a26322f9a6fad367e950e95a6001
                                    • Instruction ID: c908a3d97d913761101009f9ac27762eef9095ce4d3fd2c356dd644a45adee68
                                    • Opcode Fuzzy Hash: 23b7885bde61c3d44e42c376b76e0d35f828a26322f9a6fad367e950e95a6001
                                    • Instruction Fuzzy Hash: 6E2148B59003499FCB10DFA9C885BEEBBF5FF48310F148429E959A7240D779A954CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 830 3202fb0-3202ffe 832 3203000-320300c 830->832 833 320300e-320304d WriteProcessMemory 830->833 832->833 835 3203056-3203086 833->835 836 320304f-3203055 833->836 836->835
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 03203040
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: e49b4272e7b0d8a8442c010787c230e133fb5370ae3ddf9f041b0c23aac9495b
                                    • Instruction ID: ba5549b49aab2a6fcca302aeafeaba5cd7697a717accb92ae4de068892b5751b
                                    • Opcode Fuzzy Hash: e49b4272e7b0d8a8442c010787c230e133fb5370ae3ddf9f041b0c23aac9495b
                                    • Instruction Fuzzy Hash: 772139B5D003499FCB10DFAAC985BEEBBF5FF48310F108429E959A7241C7799944CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 840 3203098-320312d ReadProcessMemory 844 3203136-3203166 840->844 845 320312f-3203135 840->845 845->844
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 03203120
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: e4a107526d71d89cb4ff9d5a28e31fa09d9bf4a7f4fac3c5a6e5364602aec18a
                                    • Instruction ID: f4308694b1df8c9858a1b50e6ce87dfe46b660acda8612d4f8bee73a85155db8
                                    • Opcode Fuzzy Hash: e4a107526d71d89cb4ff9d5a28e31fa09d9bf4a7f4fac3c5a6e5364602aec18a
                                    • Instruction Fuzzy Hash: 3E2136B1C003499FCB10DFAAC884AEEFBF5FF48310F508429E518A7241D7389945CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 849 3202e12-3202e63 852 3202e73-3202ea3 Wow64SetThreadContext 849->852 853 3202e65-3202e71 849->853 855 3202ea5-3202eab 852->855 856 3202eac-3202edc 852->856 853->852 855->856
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 03202E96
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 213c759ecd54e74de9b7cfc2df2eace2b78c7686655c8d507947e52dcba19f9f
                                    • Instruction ID: a9a82a598af914995cca7d4ae061ce679edc38eb47fc4bc0fb25d1c3dec629ac
                                    • Opcode Fuzzy Hash: 213c759ecd54e74de9b7cfc2df2eace2b78c7686655c8d507947e52dcba19f9f
                                    • Instruction Fuzzy Hash: 9F212571D003098FDB10DFAAC4857EEFBF4EF88320F14842AD519A7241CB78A985CBA0
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015FD7C7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 8f4be1128c70402a98bb79806dbe2c7a3f9bcf93144df00b4feb0c665e0047ef
                                    • Instruction ID: e8842fa015e396e7ba61cb41c5e609c12a2decfb503ab8f011733a5c611e8de7
                                    • Opcode Fuzzy Hash: 8f4be1128c70402a98bb79806dbe2c7a3f9bcf93144df00b4feb0c665e0047ef
                                    • Instruction Fuzzy Hash: F021E3B5D012489FDB10CFAAD985AEEBFF4FB08310F14841AE918A7310C378A945CFA1
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 03203120
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 951af9bcd7244c4d07297a52d30e665a10d26572ff660bfea138dfa3a4171984
                                    • Instruction ID: 3c18927b9e05dae990831c32b5fa3832a1b160426a3b6bd9f34e8020ee3c3505
                                    • Opcode Fuzzy Hash: 951af9bcd7244c4d07297a52d30e665a10d26572ff660bfea138dfa3a4171984
                                    • Instruction Fuzzy Hash: CD2125B1C003499FCB10DFAAC884AEEFBF5FF48310F10842AE519A7240C7789945CBA0
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 03202E96
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 2c15a1d6da5852ecad4c7c0479adab4cc08c935d536ea46184eba5258f0ab664
                                    • Instruction ID: 27ffab4def8552c1adf7bcb1b81c917da68334b700600403e6b7fcec724b2b42
                                    • Opcode Fuzzy Hash: 2c15a1d6da5852ecad4c7c0479adab4cc08c935d536ea46184eba5258f0ab664
                                    • Instruction Fuzzy Hash: D1210771D003098FDB10DFAAC4857AEBBF4EF49314F14842AD559A7241CB78A985CBA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015FD7C7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 0696fe1b8b38849e2b20360e3d3a4222fb72a3cac02343465d3f41867a0ea74d
                                    • Instruction ID: adb10a5f28c1338692240f0fc1ea60e557bfa20ec4a50a765cb75f39e8acc110
                                    • Opcode Fuzzy Hash: 0696fe1b8b38849e2b20360e3d3a4222fb72a3cac02343465d3f41867a0ea74d
                                    • Instruction Fuzzy Hash: 0221C4B5D012489FDB10CF9AD584ADEBFF9FB48310F14841AE918A7350D379A944CFA5
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 03202F5E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: b1b2db015d5c93aa7e5af7e34339426f3472539044eba07d2f55583b55659fa5
                                    • Instruction ID: ca66a3188598ee699989c3c80c0dc84c8536ca1022190e1e917f324b476c5270
                                    • Opcode Fuzzy Hash: b1b2db015d5c93aa7e5af7e34339426f3472539044eba07d2f55583b55659fa5
                                    • Instruction Fuzzy Hash: A1112C75800249DFCB10DFA9D845ADEBFF5FF48314F248819E519A7250C779A544CFA1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: f0140fafbcff72bda62f9253e264554d778e08ca442f02629c60e331f6e4209c
                                    • Instruction ID: f32ea6fcde52e2ad670c342be34dd6a8ff6acf386a67320451f79eb24cfc1ee7
                                    • Opcode Fuzzy Hash: f0140fafbcff72bda62f9253e264554d778e08ca442f02629c60e331f6e4209c
                                    • Instruction Fuzzy Hash: 831137B18003498FCB10DFAAD4457EEFBF5EF89320F24881AD459A7240CB79A585CBA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 03202F5E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 140cdb04eb1ee7ba0eeeef2c68222fc79445417eb2b771bbeb993b68a025931f
                                    • Instruction ID: 5b04804d54482c523df4abfa2f4ea34cf087b6b83d4a017317098f9153f2e30a
                                    • Opcode Fuzzy Hash: 140cdb04eb1ee7ba0eeeef2c68222fc79445417eb2b771bbeb993b68a025931f
                                    • Instruction Fuzzy Hash: 7B1129718002499FCB10DFAAC848ADEBFF5EF48314F248819E519A7250C775A544CBA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 258a6fbe991db953337b8e39400a6ebfec16d5d7e59bce4384c0af9e46b96804
                                    • Instruction ID: 452426b41f49776100fa50842f52ea7ac8f529cf87f652e55bf9aaaef0b7c380
                                    • Opcode Fuzzy Hash: 258a6fbe991db953337b8e39400a6ebfec16d5d7e59bce4384c0af9e46b96804
                                    • Instruction Fuzzy Hash: F4113AB1D003498FCB20DFAAC4457EEFBF5EF88324F24881AD559A7240CB79A545CBA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 015FB0BE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 021641f5445e3a06a1ff4dfd1f67846ee5f63eadc38c0ce9f9baa746b7bfafaf
                                    • Instruction ID: 8376c991c11bb000457cb1473d962ab4dbba492a5b4867cc9f29c121599f95aa
                                    • Opcode Fuzzy Hash: 021641f5445e3a06a1ff4dfd1f67846ee5f63eadc38c0ce9f9baa746b7bfafaf
                                    • Instruction Fuzzy Hash: 0B11DFB5C002498FDB20DF9AD444B9EFBF8EF88224F10841AD529A7610D379A545CFA5
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 03205645
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: db08b99fadb11e5b5af53d7c1a2746103e09243d21ce2c016024427a3c6858ed
                                    • Instruction ID: 26bf0ce2a9d604beb665b78e5cfba86c8b932b690f632f9d4a1843a11c2865ba
                                    • Opcode Fuzzy Hash: db08b99fadb11e5b5af53d7c1a2746103e09243d21ce2c016024427a3c6858ed
                                    • Instruction Fuzzy Hash: 1F11F5B58043499FCB10DF99D448BDEFFF8EB49320F20841AE518A7241C375A984CFA1
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 03205645
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 8d0c0d6c86800f66d4fe607a0d0a70021e1de7663c94f35a559ecdfd90fcd7e5
                                    • Instruction ID: ee144f37307ae77ecfe3f4c84d63cdd2a363f3aea8fe4696e49d01dcc863bfcb
                                    • Opcode Fuzzy Hash: 8d0c0d6c86800f66d4fe607a0d0a70021e1de7663c94f35a559ecdfd90fcd7e5
                                    • Instruction Fuzzy Hash: 301106B58003499FCB10DF99D585BDEFBF8FB49320F24841AD518A7240C379A984CFA1
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 032068D0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 23b82f0b3d9d86cca8e54c651587f8472687fbffbb6a72c656db929f5e2a3ab5
                                    • Instruction ID: bb6a5a6b4f3be870ac3884d689247868e3f73023bebf45ab366832e489abfd93
                                    • Opcode Fuzzy Hash: 23b82f0b3d9d86cca8e54c651587f8472687fbffbb6a72c656db929f5e2a3ab5
                                    • Instruction Fuzzy Hash: 261136B5C006498FCB20DF99D585BDEBBF4EF48320F14842AD558A7341D379A688CFA1
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 032068D0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: f02594198910103116d0746269da01425c223032091bf1f9428272ab2f571ba4
                                    • Instruction ID: a395987e15769f3402dec5a8437ea0db692d67a9d4fc21098f58b14bc7a43fe1
                                    • Opcode Fuzzy Hash: f02594198910103116d0746269da01425c223032091bf1f9428272ab2f571ba4
                                    • Instruction Fuzzy Hash: AA1133B1C003498FCB20DF9AD584BDEBBF4EF48320F20841AD558A7240D338A588CFA5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2052978225.000000000148D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_148d000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cd2638281ef1d67d3d5d9ae0cadd5ec1db091b4df23287713360c173d7b66ed4
                                    • Instruction ID: c90e844ba53c9c31f28cc41565f70500184f0a6e040f8e5ad87c981c79984278
                                    • Opcode Fuzzy Hash: cd2638281ef1d67d3d5d9ae0cadd5ec1db091b4df23287713360c173d7b66ed4
                                    • Instruction Fuzzy Hash: 2B21F471901240DFDB05EF58D980F2BBF65FB88318F20C56BD9090A2A6C336D456C6B1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053006951.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_149d000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c5f397a8c049d6142f3451701b5f8b0a341dc24ee0c463e49ceca39f8d4efa84
                                    • Instruction ID: a8b89de523fac15e3aad18463b66db88b17a8fc6c9675e06d4c8910f1409fdf9
                                    • Opcode Fuzzy Hash: c5f397a8c049d6142f3451701b5f8b0a341dc24ee0c463e49ceca39f8d4efa84
                                    • Instruction Fuzzy Hash: 3A21F5B1904204DFDF15DF68D984B16BF65FB84358F20C56ED94A4B366C33AD407CA61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053006951.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_149d000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4020603c81fee359ed5fb07b956c24683449f3fa6f80ccbc0e05f6bd910b1126
                                    • Instruction ID: 8df22bc4ce1c85a4fa0ef04a972a678aa7578b692f004c9a19db58a35a431f02
                                    • Opcode Fuzzy Hash: 4020603c81fee359ed5fb07b956c24683449f3fa6f80ccbc0e05f6bd910b1126
                                    • Instruction Fuzzy Hash: 3421F571904204DFDF05DF98D9C0B26BF65FB84324F20C5AED9094B3A6C33AD406CA61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053006951.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_149d000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cb905b3f97cb76192fb92538a13176474922a3563d5554b036b08bb33621e002
                                    • Instruction ID: 31ed71352d60e35834b605aae1c935d7d224d41b3f34c88ed3a8acc90411e32b
                                    • Opcode Fuzzy Hash: cb905b3f97cb76192fb92538a13176474922a3563d5554b036b08bb33621e002
                                    • Instruction Fuzzy Hash: F62180755093808FDB07CF64D594716BF71EB46214F28C5DBD8498B2A7C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2052978225.000000000148D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_148d000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 120ffeef11ff7b60fe0d5001c8f988c183f03bc4a7e18c5f84835d337762be3b
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: F611E172804280CFCB02DF54D9C4B1ABF71FB88314F24C6AAD9490B667C336D45ACBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053006951.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_149d000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction ID: ddb409e28a1b10e02fa69d44a2f8bbf9a879d9eac006d584f03ae7948ddec227
                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction Fuzzy Hash: 4011BB75904280DFDB02CF54C5C4B16BFA1FB84224F24C6AAD8494B3A6C33AD40ACB62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2052978225.000000000148D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_148d000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 110efb33af682c8b2828b45a420558e7143a4aea846e25f740a16c1a899786ed
                                    • Instruction ID: a36b037552c1a5008d2d39c238444f85bce16bb6460032d3f6e9de801c21be04
                                    • Opcode Fuzzy Hash: 110efb33af682c8b2828b45a420558e7143a4aea846e25f740a16c1a899786ed
                                    • Instruction Fuzzy Hash: A10120714053C499E7107E99CD84B5BBF9CDF45320F14C52BED080A3D6C2399441C671
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2052978225.000000000148D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_148d000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 131b0b98cd2e3359508778770f27ba826fc53680e71c3bb21d968ce7265f9395
                                    • Instruction ID: f77eda126ce0f031e5e6c0e3eb6b859f665dfbe120daabce6b2ef1340a696adb
                                    • Opcode Fuzzy Hash: 131b0b98cd2e3359508778770f27ba826fc53680e71c3bb21d968ce7265f9395
                                    • Instruction Fuzzy Hash: FEF0C2714053849AEB10AE1AC888B67FF98EF46234F18C45AED480A396C2799840CBB1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 31c1a9ffccdf7aca90161de5c9de8897928fa9397a8d210359c7da89388f3da9
                                    • Instruction ID: 6ef059c8d3c83b64636682dc250d65c6ba315c488a423ac8c151eaccd093ff1a
                                    • Opcode Fuzzy Hash: 31c1a9ffccdf7aca90161de5c9de8897928fa9397a8d210359c7da89388f3da9
                                    • Instruction Fuzzy Hash: D1E10775E102198FCB14CFA8C5849AEFBB2FF89305F24856AD414AB356C731AD85CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4a247233a63ad816012925614eba4c624abef498d1bbe8b791d8f7c551f9e468
                                    • Instruction ID: 6652b991e7b90a9e81f9d69c24e5c2987bb7c42c1a269ac07ac08945f8bc8776
                                    • Opcode Fuzzy Hash: 4a247233a63ad816012925614eba4c624abef498d1bbe8b791d8f7c551f9e468
                                    • Instruction Fuzzy Hash: 74E1E475E101198FDB14CFA9C580AAEFBB2FB89305F24C169D414AB356D730AD85CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8f5497bc16f0ddc224c1bfafd238716b36f74cc9d27b910b76bdc85aef13872
                                    • Instruction ID: 473b8211f73ef80d7c4187700ac812892533ce2225f69e3637fca1fc84ddd1b5
                                    • Opcode Fuzzy Hash: f8f5497bc16f0ddc224c1bfafd238716b36f74cc9d27b910b76bdc85aef13872
                                    • Instruction Fuzzy Hash: 4DE1F975E10219CFCB14CFA8C5849AEFBB6FF89305F24856AD414AB356D730A985CFA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3ddf54c400f5c40748aab12d1f619e653a119323be2303a6dc3a1b3d339100cd
                                    • Instruction ID: 2d4913b0e55c52b7c1ed357547cbad89def20dafb6228f1a846f8a4576c27892
                                    • Opcode Fuzzy Hash: 3ddf54c400f5c40748aab12d1f619e653a119323be2303a6dc3a1b3d339100cd
                                    • Instruction Fuzzy Hash: A6E1F4B5E101198FDB14DFA9C580AAEFBB2FF89305F24C169D414AB356C730A985CFA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 437159a7ab4bea6266bf89d3412918ed25a57026bd9e2a85841cbed261e9217f
                                    • Instruction ID: 88eeea6cf5f569f9b1da32b98274c8e337e4ff6b33463251bf32c4a7592061ea
                                    • Opcode Fuzzy Hash: 437159a7ab4bea6266bf89d3412918ed25a57026bd9e2a85841cbed261e9217f
                                    • Instruction Fuzzy Hash: E4E1F875E102198FCB14CFA9C5809AEFBB2FF89305F248169D414AB396D731AD85CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053169292.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15f0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a9f11f498960fafe842be564052270fd83b8e119fe81bfa19692c281c729aa53
                                    • Instruction ID: 742d106894b0735c03ed7316c04cb3fa80de44c0e35967c83a2dd3d6fd69dca3
                                    • Opcode Fuzzy Hash: a9f11f498960fafe842be564052270fd83b8e119fe81bfa19692c281c729aa53
                                    • Instruction Fuzzy Hash: 41A17032E002169FCF15DFB4C88499EBBB2FF85300B15856EEA05AF265DB31E955CB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 70c19bd786f9becc977bdac60dcc4391a80731657e2902f85a66dd70651bd440
                                    • Instruction ID: 02f3399d5321163ff996379304956cf2c2dedc9a1f49247c637d1cbd856b737b
                                    • Opcode Fuzzy Hash: 70c19bd786f9becc977bdac60dcc4391a80731657e2902f85a66dd70651bd440
                                    • Instruction Fuzzy Hash: 59616075E142198FCB15CF69C9805AEFBF6FF89300F24816AD418AB252C730A985CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1748bee69402c2dc7798f0cb3e8116c714a5438df7f4f641d0a0b07ccb714c31
                                    • Instruction ID: c580644f19fb9da39923825f9072e53f78b52716c872a0cac217c22f0faee810
                                    • Opcode Fuzzy Hash: 1748bee69402c2dc7798f0cb3e8116c714a5438df7f4f641d0a0b07ccb714c31
                                    • Instruction Fuzzy Hash: 77616F71D052598FDB15CF69C9805AEFBF2FF8A300F18C1AAD408AB256D7349945CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2053686278.0000000003200000.00000040.00000800.00020000.00000000.sdmp, Offset: 03200000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3200000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed20375df2f21445443332c5ef10e63a95ed63a96b3cb148e400e56a778f2f0c
                                    • Instruction ID: 2caf907a1a936049f15c8d94ffae7b3687abcf6b14545ad722bde380f9dcee85
                                    • Opcode Fuzzy Hash: ed20375df2f21445443332c5ef10e63a95ed63a96b3cb148e400e56a778f2f0c
                                    • Instruction Fuzzy Hash: BD5108B1E102198FDB14CFA9C9805AEFBF2BF89305F24C169D418AB256D7319A45CFA1

                                    Execution Graph

                                    Execution Coverage:11.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:470
                                    Total number of Limit Nodes:41
                                    execution_graph 24505 10ed01c 24506 10ed034 24505->24506 24507 10ed08e 24506->24507 24513 53e20d0 24506->24513 24518 53e1f77 24506->24518 24523 53e2f18 24506->24523 24532 53e2f28 24506->24532 24541 53e1f88 24506->24541 24514 53e20c7 24513->24514 24516 53e20d6 24513->24516 24514->24507 24515 53e2356 24516->24515 24517 53e1fe8 2 API calls 24516->24517 24517->24515 24519 53e1fae 24518->24519 24521 53e2f28 16 API calls 24519->24521 24522 53e2f18 16 API calls 24519->24522 24520 53e1fcf 24520->24507 24521->24520 24522->24520 24525 53e2f28 24523->24525 24524 53e2f89 24562 53e2b64 24524->24562 24525->24524 24527 53e2f79 24525->24527 24546 53e317c 24527->24546 24552 53e30b0 24527->24552 24557 53e30a0 24527->24557 24528 53e2f87 24528->24528 24535 53e2f55 24532->24535 24533 53e2f89 24534 53e2b64 CallWindowProcW 24533->24534 24536 53e2f87 24534->24536 24535->24533 24537 53e2f79 24535->24537 24538 53e317c 16 API calls 24537->24538 24539 53e30b0 16 API calls 24537->24539 24540 53e30a0 16 API calls 24537->24540 24538->24536 24539->24536 24540->24536 24542 53e1fae 24541->24542 24544 53e2f28 16 API calls 24542->24544 24545 53e2f18 16 API calls 24542->24545 24543 53e1fcf 24543->24507 24544->24543 24545->24543 24547 53e318a 24546->24547 24548 53e313a 24546->24548 24566 53e3168 24548->24566 24571 53e3159 24548->24571 24549 53e3150 24549->24528 24554 53e30c4 24552->24554 24553 53e3150 24553->24528 24555 53e3168 16 API calls 24554->24555 24556 53e3159 16 API calls 24554->24556 24555->24553 24556->24553 24559 53e30c4 24557->24559 24558 53e3150 24558->24528 24560 53e3168 16 API calls 24559->24560 24561 53e3159 16 API calls 24559->24561 24560->24558 24561->24558 24563 53e2b6f 24562->24563 24564 53e43ea CallWindowProcW 24563->24564 24565 53e4399 24563->24565 24564->24565 24565->24528 24567 53e3179 24566->24567 24576 53e4316 24566->24576 24579 53e8260 24566->24579 24596 53e8270 24566->24596 24567->24549 24572 53e3179 24571->24572 24573 53e4316 CallWindowProcW 24571->24573 24574 53e8270 16 API calls 24571->24574 24575 53e8260 16 API calls 24571->24575 24572->24549 24573->24572 24574->24572 24575->24572 24577 53e2b64 CallWindowProcW 24576->24577 24578 53e433a 24577->24578 24578->24567 24580 53e8270 24579->24580 24581 53e828e 24580->24581 24582 53e82d0 24580->24582 24585 53e829c 24580->24585 24583 53e82aa 24581->24583 24584 53e8293 24581->24584 24582->24585 24587 53e855c 24582->24587 24583->24585 24590 53e84c8 24583->24590 24591 53e8524 24583->24591 24594 53e83d6 24583->24594 24584->24585 24586 53e84ba 24584->24586 24585->24594 24627 53e8a00 24585->24627 24613 53e7ad8 24586->24613 24621 53e7b88 24587->24621 24632 53e7ae8 24590->24632 24617 53e7b48 24591->24617 24594->24567 24597 53e8289 24596->24597 24602 53e829c 24596->24602 24598 53e828e 24597->24598 24599 53e82d0 24597->24599 24600 53e82aa 24598->24600 24601 53e8293 24598->24601 24599->24602 24604 53e855c 24599->24604 24600->24602 24607 53e83d6 24600->24607 24608 53e84c8 24600->24608 24609 53e8524 24600->24609 24601->24602 24603 53e84ba 24601->24603 24602->24607 24612 53e8a00 16 API calls 24602->24612 24605 53e7ad8 16 API calls 24603->24605 24606 53e7b88 16 API calls 24604->24606 24605->24607 24606->24607 24607->24567 24610 53e7ae8 8 API calls 24608->24610 24611 53e7b48 16 API calls 24609->24611 24610->24607 24611->24607 24612->24607 24614 53e7ae3 24613->24614 24615 53e8a00 16 API calls 24614->24615 24616 53e8c16 24615->24616 24616->24594 24618 53e7b53 24617->24618 24619 53e8a00 16 API calls 24618->24619 24620 53ed0fc 24619->24620 24620->24594 24622 53e7b93 24621->24622 24623 53e7ae8 8 API calls 24622->24623 24624 53ec980 24623->24624 24625 53e8a00 16 API calls 24624->24625 24626 53ec989 24625->24626 24626->24594 24628 53e8a0b 24627->24628 24629 53e8a12 24627->24629 24628->24594 24638 53e8a20 24629->24638 24630 53e8a18 24630->24594 24634 53e7af3 24632->24634 24633 53ebab7 24633->24594 24634->24633 24635 53e4630 8 API calls 24634->24635 24636 53eb8d4 24635->24636 24636->24633 24637 53e78bc 8 API calls 24636->24637 24637->24633 24639 53e8a3e 24638->24639 24640 53e8a60 24638->24640 24643 53e8a4c 24639->24643 24646 53e3720 24639->24646 24641 53e3720 16 API calls 24640->24641 24645 53e8a67 24641->24645 24643->24630 24644 53e8a88 24644->24630 24645->24630 24647 53e376c 24646->24647 24648 53e3edc 24647->24648 24651 53e37b0 24647->24651 24656 53e351c 24648->24656 24650 53e3a0c 24650->24644 24651->24650 24652 53e40ed GetFocus 24651->24652 24653 53e411a 24651->24653 24652->24653 24653->24650 24661 53e8a90 24653->24661 24665 53e8aa0 24653->24665 24657 53e3527 24656->24657 24658 53ed1cd 24657->24658 24660 12cc4b8 14 API calls 24657->24660 24658->24650 24659 53ed198 24659->24659 24660->24659 24662 53e8aa0 24661->24662 24663 53e8b09 24662->24663 24664 53e2b64 CallWindowProcW 24662->24664 24663->24650 24664->24663 24666 53e8ae6 24665->24666 24667 53e2b64 CallWindowProcW 24666->24667 24668 53e8b09 24666->24668 24667->24668 24668->24650 24129 12cbf08 24132 12cbff0 24129->24132 24130 12cbf17 24133 12cc034 24132->24133 24134 12cc011 24132->24134 24133->24130 24134->24133 24135 12cc238 GetModuleHandleW 24134->24135 24136 12cc265 24135->24136 24136->24130 24137 12c6788 DuplicateHandle 24138 12c681e 24137->24138 24139 12c4668 24140 12c4676 24139->24140 24147 12c6de0 24140->24147 24141 12c46e9 24152 53e6b10 24141->24152 24156 53e6b00 24141->24156 24160 53e6ad1 24141->24160 24142 12c470c 24148 12c6e05 24147->24148 24165 12c6edf 24148->24165 24169 12c6ef0 24148->24169 24149 12c6e0f 24149->24141 24153 53e6b22 24152->24153 24177 53e5ad8 24153->24177 24157 53e6b10 24156->24157 24158 53e5ad8 14 API calls 24157->24158 24159 53e6b42 24158->24159 24159->24142 24161 53e6ada 24160->24161 24162 53e6b19 24160->24162 24161->24142 24163 53e5ad8 14 API calls 24162->24163 24164 53e6b42 24163->24164 24164->24142 24167 12c6f17 24165->24167 24166 12c6ff4 24166->24166 24167->24166 24173 12c6414 24167->24173 24171 12c6f17 24169->24171 24170 12c6ff4 24170->24170 24171->24170 24172 12c6414 CreateActCtxA 24171->24172 24172->24170 24174 12c7370 CreateActCtxA 24173->24174 24176 12c7433 24174->24176 24178 53e5ae3 24177->24178 24181 53e5b14 24178->24181 24180 53e6c54 24183 53e5b1f 24181->24183 24182 53e6e00 14 API calls 24186 53e72c9 24182->24186 24185 53e716e 24183->24185 24183->24186 24187 53e6e00 24183->24187 24185->24182 24185->24186 24186->24180 24188 53e6e0b 24187->24188 24192 53e7518 24188->24192 24204 53e7507 24188->24204 24189 53e7504 24189->24185 24193 53e753e 24192->24193 24194 53e7552 24193->24194 24195 53e762f 24193->24195 24199 53e7692 24193->24199 24194->24189 24216 12ce2c0 24195->24216 24198 53e7665 24198->24189 24199->24198 24227 53e4630 24199->24227 24201 53e7737 24201->24198 24232 53e7030 24201->24232 24206 53e7518 24204->24206 24205 53e7552 24205->24189 24206->24205 24207 53e762f 24206->24207 24211 53e7692 24206->24211 24215 12ce2c0 14 API calls 24207->24215 24208 53e763d 24209 53e4630 8 API calls 24208->24209 24210 53e7665 24208->24210 24209->24210 24210->24189 24211->24210 24212 53e4630 8 API calls 24211->24212 24213 53e7737 24212->24213 24213->24210 24214 53e7030 8 API calls 24213->24214 24214->24210 24215->24208 24217 12ce2ee 24216->24217 24219 12ce317 24217->24219 24224 12ce42b 24217->24224 24251 12cc530 GetFocus 24217->24251 24220 12ce3bf 24219->24220 24219->24224 24226 53e4630 8 API calls 24219->24226 24246 53e461f 24219->24246 24220->24224 24252 12cc4b8 24220->24252 24222 12ce366 24223 12ce3ba KiUserCallbackDispatcher 24222->24223 24223->24220 24226->24222 24228 53e4640 24227->24228 24229 53e467d 24228->24229 24230 53e7cb0 8 API calls 24228->24230 24231 53e7cc0 8 API calls 24228->24231 24229->24201 24230->24229 24231->24229 24237 53e703b 24232->24237 24233 53e9834 24242 53e4630 8 API calls 24233->24242 24245 53e9868 24233->24245 24234 53e981a 24236 53e5a6c 8 API calls 24234->24236 24235 53e97e1 24235->24234 24238 53e5a6c 8 API calls 24235->24238 24239 53e9826 24236->24239 24237->24233 24237->24235 24237->24245 24399 53e8fe4 24237->24399 24240 53e980c 24238->24240 24241 53e8ff4 8 API calls 24239->24241 24403 53e8ff4 24240->24403 24241->24233 24242->24245 24245->24198 24247 53e4640 24246->24247 24248 53e467d 24247->24248 24256 53e7cb0 24247->24256 24280 53e7cc0 24247->24280 24248->24222 24251->24219 24253 12cc4c3 24252->24253 24369 12cf104 24253->24369 24255 12cfdcf 24255->24224 24260 53e7cf9 24256->24260 24257 53e7df3 24258 53e0040 2 API calls 24257->24258 24268 53e7dc8 24257->24268 24258->24268 24260->24257 24262 53e7d97 24260->24262 24304 53e0040 24262->24304 24263 53e7030 8 API calls 24264 53e7e0d 24263->24264 24316 53e78bc 24264->24316 24310 53e78ac 24268->24310 24270 53e7e3c 24271 53e4630 8 API calls 24270->24271 24273 53e7f1f 24270->24273 24272 53e7ec5 24271->24272 24327 53e1fe8 24272->24327 24341 53ecf90 24273->24341 24345 53ecf80 24273->24345 24274 53e7f94 24276 53e7ee8 24276->24273 24331 53e5a6c 24276->24331 24284 53e7cf9 24280->24284 24281 53e7df3 24282 53e0040 2 API calls 24281->24282 24292 53e7dc8 24281->24292 24282->24292 24283 53e78ac 8 API calls 24285 53e7e03 24283->24285 24284->24281 24286 53e7d97 24284->24286 24287 53e7030 8 API calls 24285->24287 24291 53e0040 2 API calls 24286->24291 24288 53e7e0d 24287->24288 24289 53e78bc 8 API calls 24288->24289 24290 53e7e15 24289->24290 24293 53e78cc 8 API calls 24290->24293 24294 53e7e3c 24290->24294 24291->24292 24292->24283 24293->24294 24295 53e4630 8 API calls 24294->24295 24297 53e7f1f 24294->24297 24296 53e7ec5 24295->24296 24299 53e1fe8 2 API calls 24296->24299 24302 53ecf90 8 API calls 24297->24302 24303 53ecf80 8 API calls 24297->24303 24298 53e7f94 24300 53e7ee8 24299->24300 24300->24297 24301 53e5a6c 8 API calls 24300->24301 24301->24297 24302->24298 24303->24298 24306 53e0171 24304->24306 24307 53e0071 24304->24307 24305 53e007d 24305->24268 24306->24268 24307->24305 24349 53e0e98 24307->24349 24353 53e0e87 24307->24353 24312 53e78b7 24310->24312 24311 53e7e03 24311->24263 24312->24311 24313 53e4630 8 API calls 24312->24313 24314 53e96b8 24313->24314 24315 53e1fe8 2 API calls 24314->24315 24315->24311 24317 53e78c7 24316->24317 24318 53e7e15 24317->24318 24319 53e4630 8 API calls 24317->24319 24318->24270 24322 53e78cc 24318->24322 24320 53eb5ec 24319->24320 24357 53e9de8 24320->24357 24324 53e78d7 24322->24324 24323 53ebcb6 24323->24270 24324->24323 24325 53e4630 8 API calls 24324->24325 24326 53ebd86 24325->24326 24326->24270 24361 53e2018 SetWindowLongW 24327->24361 24363 53e2010 SetWindowLongW 24327->24363 24328 53e2000 24328->24276 24333 53e5a77 24331->24333 24332 53eb4ae 24332->24273 24333->24332 24334 53eb534 SendMessageW 24333->24334 24335 53eb4f3 24333->24335 24338 53eb59c 24334->24338 24336 53e4630 7 API calls 24335->24336 24337 53eb508 24336->24337 24365 53e9dc0 24337->24365 24338->24273 24342 53ecf9d 24341->24342 24343 53e78bc 8 API calls 24342->24343 24344 53ecfa4 24343->24344 24344->24274 24346 53ecf90 24345->24346 24347 53e78bc 8 API calls 24346->24347 24348 53ecfa4 24347->24348 24348->24274 24350 53e0ec3 24349->24350 24351 53e0f72 24350->24351 24352 53e1c70 CreateWindowExW CreateWindowExW 24350->24352 24352->24351 24354 53e0e8e 24353->24354 24355 53e0f72 24354->24355 24356 53e1c70 CreateWindowExW CreateWindowExW 24354->24356 24356->24355 24358 53e9df3 24357->24358 24359 53e7ae8 8 API calls 24358->24359 24360 53eb6d4 24359->24360 24360->24318 24362 53e2084 24361->24362 24362->24328 24364 53e2084 24363->24364 24364->24328 24366 53eb530 SendMessageW 24365->24366 24368 53eb519 24366->24368 24368->24273 24372 12cf10f 24369->24372 24370 12cff78 24370->24255 24371 12cff41 24376 53ed260 24371->24376 24381 53ed250 24371->24381 24372->24370 24372->24371 24373 12cf104 14 API calls 24372->24373 24373->24372 24377 53ed272 24376->24377 24378 53ed2af 24377->24378 24386 53ed5b8 24377->24386 24392 53ed5a8 24377->24392 24378->24370 24383 53ed272 24381->24383 24382 53ed2af 24382->24370 24383->24382 24384 53ed5b8 14 API calls 24383->24384 24385 53ed5a8 14 API calls 24383->24385 24384->24382 24385->24382 24390 53e7518 14 API calls 24386->24390 24391 53e7507 14 API calls 24386->24391 24387 53ed5d0 24388 53ec67c 12 API calls 24387->24388 24389 53ed5d9 24388->24389 24389->24378 24390->24387 24391->24387 24393 53ed5b8 24392->24393 24397 53e7518 14 API calls 24393->24397 24398 53e7507 14 API calls 24393->24398 24394 53ed5d0 24395 53ec67c 12 API calls 24394->24395 24396 53ed5d9 24395->24396 24396->24378 24397->24394 24398->24394 24400 53e8fef 24399->24400 24409 53e9d94 8 API calls 24400->24409 24402 53eb35d 24402->24235 24404 53e8fff 24403->24404 24405 53e4630 8 API calls 24404->24405 24406 53eb508 24405->24406 24407 53e9dc0 SendMessageW 24406->24407 24408 53eb519 24407->24408 24408->24234 24409->24402 24410 53e44b8 24411 53e44c8 24410->24411 24415 53e8e08 24411->24415 24421 53e8df9 24411->24421 24412 53e44f1 24416 53e8e3d 24415->24416 24427 53e5c08 24416->24427 24418 53e8e92 24439 53e7c50 24418->24439 24420 53e8e99 24420->24412 24422 53e8e08 24421->24422 24423 53e5c08 8 API calls 24422->24423 24424 53e8e92 24423->24424 24425 53e7c50 8 API calls 24424->24425 24426 53e8e99 24425->24426 24426->24412 24432 53e5c34 24427->24432 24429 53e5e6c 24430 53e4630 8 API calls 24429->24430 24431 53e6013 24429->24431 24430->24431 24431->24418 24432->24429 24449 53e55fc 24432->24449 24433 53e5ced 24434 53e4630 8 API calls 24433->24434 24436 53e5d95 24433->24436 24435 53e5d5f 24434->24435 24437 53e4630 8 API calls 24435->24437 24438 53e4630 8 API calls 24436->24438 24437->24436 24438->24429 24440 53e7c5b 24439->24440 24441 53e93fd 24440->24441 24442 53e9435 24440->24442 24448 53e9404 24440->24448 24443 53e4630 8 API calls 24441->24443 24444 53e945a 24442->24444 24445 53e9486 24442->24445 24443->24448 24447 53e4630 8 API calls 24444->24447 24446 53e4630 8 API calls 24445->24446 24446->24448 24447->24448 24448->24420 24451 53e5607 24449->24451 24450 53e4630 8 API calls 24453 53e6169 24450->24453 24452 53e4630 8 API calls 24451->24452 24451->24453 24454 53e61a7 24451->24454 24452->24453 24453->24450 24453->24454 24454->24433 24669 53ec388 24670 53ec38c 24669->24670 24671 53e4630 8 API calls 24670->24671 24672 53ec398 24671->24672 24673 53e1fe8 2 API calls 24672->24673 24674 53ec3aa 24673->24674 24675 53e99c8 24676 53e99d9 24675->24676 24679 53e9a43 24676->24679 24680 53e9068 24676->24680 24681 53e9073 24680->24681 24682 53e9a3c 24681->24682 24684 53eb159 24681->24684 24686 53eb182 24684->24686 24685 53eb18f 24685->24682 24686->24685 24687 53eb1b8 CreateIconFromResourceEx 24686->24687 24688 53eb236 24687->24688 24688->24682 24455 12ce120 24456 12ce12d 24455->24456 24457 12ce166 24456->24457 24459 12cc464 24456->24459 24460 12cc46f 24459->24460 24461 12ce1d8 24460->24461 24463 12cc498 24460->24463 24464 12cc4a3 24463->24464 24471 12ce2c0 14 API calls 24464->24471 24465 12ce256 24474 12cc4a8 24465->24474 24468 12cc4b8 14 API calls 24469 12ce277 24468->24469 24473 53e0040 2 API calls 24469->24473 24479 53e003b 24469->24479 24470 12ce281 24470->24461 24471->24465 24473->24470 24475 12cc4b3 24474->24475 24478 12cf7c9 24475->24478 24485 12cf01c 24475->24485 24477 12ce270 24477->24468 24481 53e0071 24479->24481 24482 53e0171 24479->24482 24480 53e007d 24480->24470 24481->24480 24483 53e0e98 2 API calls 24481->24483 24484 53e0e87 2 API calls 24481->24484 24482->24470 24483->24482 24484->24482 24487 12cf027 24485->24487 24486 12cf8f5 24486->24477 24487->24486 24488 12cc4b8 14 API calls 24487->24488 24488->24486 24489 12c6540 24490 12c6586 GetCurrentProcess 24489->24490 24492 12c65d8 GetCurrentThread 24490->24492 24493 12c65d1 24490->24493 24494 12c660e 24492->24494 24495 12c6615 GetCurrentProcess 24492->24495 24493->24492 24494->24495 24498 12c664b 24495->24498 24496 12c6673 GetCurrentThreadId 24497 12c66a4 24496->24497 24498->24496 24499 53e5eb3 24500 53e5ebc 24499->24500 24502 53e5eda 24499->24502 24501 53e4630 8 API calls 24500->24501 24500->24502 24501->24502 24503 53e4630 8 API calls 24502->24503 24504 53e6013 24502->24504 24503->24504

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 730 12c6530-12c653d 732 12c653e 730->732 733 12c653f-12c65cf GetCurrentProcess 730->733 732->733 738 12c65d8-12c660c GetCurrentThread 733->738 739 12c65d1-12c65d7 733->739 740 12c660e-12c6614 738->740 741 12c6615-12c6649 GetCurrentProcess 738->741 739->738 740->741 743 12c664b-12c6651 741->743 744 12c6652-12c666d call 12c670f 741->744 743->744 747 12c6673-12c66a2 GetCurrentThreadId 744->747 748 12c66ab-12c670d 747->748 749 12c66a4-12c66aa 747->749 749->748
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 012C65BE
                                    • GetCurrentThread.KERNEL32 ref: 012C65FB
                                    • GetCurrentProcess.KERNEL32 ref: 012C6638
                                    • GetCurrentThreadId.KERNEL32 ref: 012C6691
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080775142.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_12c0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: e0516b26b48fd6ee9b19f9962a8fa42396046d732315ee900a5c6652fcf9e671
                                    • Instruction ID: b5019684c78481a47a67c350eb32b07b3199d15b0d0ecc19b2224926c035d98c
                                    • Opcode Fuzzy Hash: e0516b26b48fd6ee9b19f9962a8fa42396046d732315ee900a5c6652fcf9e671
                                    • Instruction Fuzzy Hash: 715187B090134A8FDB08DFA9D948BAEBFF1EF49304F248559D209A73A1C7386944CF65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 756 12c6540-12c65cf GetCurrentProcess 760 12c65d8-12c660c GetCurrentThread 756->760 761 12c65d1-12c65d7 756->761 762 12c660e-12c6614 760->762 763 12c6615-12c6649 GetCurrentProcess 760->763 761->760 762->763 765 12c664b-12c6651 763->765 766 12c6652-12c666d call 12c670f 763->766 765->766 769 12c6673-12c66a2 GetCurrentThreadId 766->769 770 12c66ab-12c670d 769->770 771 12c66a4-12c66aa 769->771 771->770
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 012C65BE
                                    • GetCurrentThread.KERNEL32 ref: 012C65FB
                                    • GetCurrentProcess.KERNEL32 ref: 012C6638
                                    • GetCurrentThreadId.KERNEL32 ref: 012C6691
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080775142.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_12c0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 9f09b066e382c77fa46fead20af93d29c13ae4a91c6fa0cf548cb9f56cc7d15a
                                    • Instruction ID: 8bc42b1b9080ac32c7590cac265581e26be963d7c08a1b06095bcc3f3c65f878
                                    • Opcode Fuzzy Hash: 9f09b066e382c77fa46fead20af93d29c13ae4a91c6fa0cf548cb9f56cc7d15a
                                    • Instruction Fuzzy Hash: 055135B09113098FDB18DFA9D548B9EBBF5EF48304F208559E509A7390DB38A944CF65
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5e020d418b4a11c6f2bcf78728af2521827632b258a07a50807ca51da9c2cfe5
                                    • Instruction ID: 32fa7d8f76b18dc630ed25fda50fa340be86944e3d953e5862a446fcadc506e0
                                    • Opcode Fuzzy Hash: 5e020d418b4a11c6f2bcf78728af2521827632b258a07a50807ca51da9c2cfe5
                                    • Instruction Fuzzy Hash: DC224A74E04265CBCF14DB98C889AAEB7F7FF88310F248556D902AB7D5C774A882CB51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1056 12cbff0-12cc00f 1057 12cc03b-12cc03f 1056->1057 1058 12cc011-12cc01e call 12caf60 1056->1058 1060 12cc041-12cc04b 1057->1060 1061 12cc053-12cc094 1057->1061 1064 12cc034 1058->1064 1065 12cc020-12cc02e call 12cc698 1058->1065 1060->1061 1067 12cc096-12cc09e 1061->1067 1068 12cc0a1-12cc0af 1061->1068 1064->1057 1065->1064 1074 12cc170-12cc230 1065->1074 1067->1068 1069 12cc0b1-12cc0b6 1068->1069 1070 12cc0d3-12cc0d5 1068->1070 1072 12cc0b8-12cc0bf call 12caf6c 1069->1072 1073 12cc0c1 1069->1073 1075 12cc0d8-12cc0df 1070->1075 1077 12cc0c3-12cc0d1 1072->1077 1073->1077 1106 12cc238-12cc263 GetModuleHandleW 1074->1106 1107 12cc232-12cc235 1074->1107 1078 12cc0ec-12cc0f3 1075->1078 1079 12cc0e1-12cc0e9 1075->1079 1077->1075 1082 12cc0f5-12cc0fd 1078->1082 1083 12cc100-12cc109 call 12caf7c 1078->1083 1079->1078 1082->1083 1087 12cc10b-12cc113 1083->1087 1088 12cc116-12cc11b 1083->1088 1087->1088 1089 12cc11d-12cc124 1088->1089 1090 12cc139-12cc146 1088->1090 1089->1090 1092 12cc126-12cc136 call 12caf8c call 12caf9c 1089->1092 1097 12cc148-12cc166 1090->1097 1098 12cc169-12cc16f 1090->1098 1092->1090 1097->1098 1108 12cc26c-12cc280 1106->1108 1109 12cc265-12cc26b 1106->1109 1107->1106 1109->1108
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 012CC256
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080775142.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_12c0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 42d8c22b7082aba125cbe108675ed97324716012b875b60612643782b9a218c4
                                    • Instruction ID: 4e9a27fbaad706f6d5058b316512acb5478d0bae13bdcbed0312e93df31f06b3
                                    • Opcode Fuzzy Hash: 42d8c22b7082aba125cbe108675ed97324716012b875b60612643782b9a218c4
                                    • Instruction Fuzzy Hash: 6A818AB0A10B468FD724DF69D45076ABBF1FF88700F008A2ED68AD7A40D775E856CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1112 53edae7-53edb55 1114 53edb9c-53edba6 call 53ec8fc 1112->1114 1115 53edb57-53edb62 1112->1115 1119 53edbbc-53edbd4 1114->1119 1120 53edba8-53edbb7 call 53ec8fc call 53ec90c 1114->1120 1121 53edb64-53edb6f 1115->1121 1122 53edb71-53edb97 call 53e4630 call 53e9e10 1115->1122 1129 53edbda-53edc45 GetCurrentThreadId 1119->1129 1130 53edc92-53edc9f call 53eead8 1119->1130 1120->1119 1121->1114 1121->1122 1122->1114 1154 53edc4e-53edc84 call 53e4630 call 53ec91c 1129->1154 1155 53edc47-53edc4d 1129->1155 1136 53edcb9-53edcbb 1130->1136 1137 53edca1-53edcb0 call 53e4630 1130->1137 1138 53edcbd-53edcc2 call 53ec90c 1136->1138 1139 53edcc7-53edccb 1136->1139 1137->1136 1138->1139 1145 53edccd-53edcdf call 53e4630 call 53ec928 1139->1145 1146 53edce4-53edce8 1139->1146 1145->1146 1148 53edcea 1146->1148 1149 53edcf2-53edcff 1146->1149 1148->1149 1161 53edc89 1154->1161 1155->1154 1161->1130
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 053EDC34
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CurrentThread
                                    • String ID:
                                    • API String ID: 2882836952-0
                                    • Opcode ID: 59be72aa9109753ff3e8e30c886cc7236a97ffeb79b36b86e65f510a1aa74031
                                    • Instruction ID: d2ad95f765dbcbc4d57c832e1dcdeb45fd8d4e314fe555d32731d23d688e26bd
                                    • Opcode Fuzzy Hash: 59be72aa9109753ff3e8e30c886cc7236a97ffeb79b36b86e65f510a1aa74031
                                    • Instruction Fuzzy Hash: A761F071E002589FCB18DFA9D594AADFBF6FF84300F148529E41AAB3A4DB74AC45CB41

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1163 53edaf8-53edb55 1165 53edb9c-53edba6 call 53ec8fc 1163->1165 1166 53edb57-53edb62 1163->1166 1170 53edbbc-53edbd4 1165->1170 1171 53edba8-53edbb7 call 53ec8fc call 53ec90c 1165->1171 1172 53edb64-53edb6f 1166->1172 1173 53edb71-53edb97 call 53e4630 call 53e9e10 1166->1173 1180 53edbda-53edc45 GetCurrentThreadId 1170->1180 1181 53edc92-53edc9f call 53eead8 1170->1181 1171->1170 1172->1165 1172->1173 1173->1165 1205 53edc4e-53edc84 call 53e4630 call 53ec91c 1180->1205 1206 53edc47-53edc4d 1180->1206 1187 53edcb9-53edcbb 1181->1187 1188 53edca1-53edcb0 call 53e4630 1181->1188 1189 53edcbd-53edcc2 call 53ec90c 1187->1189 1190 53edcc7-53edccb 1187->1190 1188->1187 1189->1190 1196 53edccd-53edcdf call 53e4630 call 53ec928 1190->1196 1197 53edce4-53edce8 1190->1197 1196->1197 1199 53edcea 1197->1199 1200 53edcf2-53edcff 1197->1200 1199->1200 1212 53edc89 1205->1212 1206->1205 1212->1181
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 053EDC34
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CurrentThread
                                    • String ID:
                                    • API String ID: 2882836952-0
                                    • Opcode ID: fc90ea2c95d35fc6598680f05a468a4778858169788c73e0918df67fb4ec9e60
                                    • Instruction ID: 590b42eba608204e23694c2b4a79b1e4ba2f1d4f9852749591c0950a9ef0409f
                                    • Opcode Fuzzy Hash: fc90ea2c95d35fc6598680f05a468a4778858169788c73e0918df67fb4ec9e60
                                    • Instruction Fuzzy Hash: 8B51DF74E002589FCB18EFA9D554AADFBF5FF84300F108529E419AB3A4DB74AC45CB51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1214 53ec90c-53ee161 1218 53ee16e 1214->1218 1219 53ee163-53ee16c 1214->1219 1220 53ee170-53ee175 1218->1220 1219->1220 1221 53ee177-53ee194 1220->1221 1222 53ee195-53ee22a 1220->1222 1229 53ee22c-53ee234 1222->1229 1230 53ee236-53ee266 EnumThreadWindows 1222->1230 1229->1230 1231 53ee26f-53ee29c 1230->1231 1232 53ee268-53ee26e 1230->1232 1232->1231
                                    APIs
                                    • EnumThreadWindows.USER32(?,00000000,?), ref: 053EE259
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: EnumThreadWindows
                                    • String ID:
                                    • API String ID: 2941952884-0
                                    • Opcode ID: 6e9bad0460bdd7b06e7f41fc460b193f95a21ec438c3d0f2ed116f60c2610c9d
                                    • Instruction ID: c9b0efff564a712ff9e478ca8962b20febdf407ae7b3b2558914e743331bccd6
                                    • Opcode Fuzzy Hash: 6e9bad0460bdd7b06e7f41fc460b193f95a21ec438c3d0f2ed116f60c2610c9d
                                    • Instruction Fuzzy Hash: 5B41A371A042198FDB14DF99C844BBEBBF9FF88310F14842AD419E7390CB789945DB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1236 53e1dc4-53e1e36 1237 53e1e38-53e1e3e 1236->1237 1238 53e1e41-53e1e48 1236->1238 1237->1238 1239 53e1e4a-53e1e50 1238->1239 1240 53e1e53-53e1ef2 CreateWindowExW 1238->1240 1239->1240 1242 53e1efb-53e1f33 1240->1242 1243 53e1ef4-53e1efa 1240->1243 1247 53e1f35-53e1f38 1242->1247 1248 53e1f40 1242->1248 1243->1242 1247->1248 1249 53e1f41 1248->1249 1249->1249
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 053E1EE2
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: bd7d57daf28d972c1e9e64121000edac9a25b5704ece4759da822ac63d36521f
                                    • Instruction ID: eb1cea88020b38ccc8a4a683048e2f6258134e2a6b79c8dbed197c3edebb0bec
                                    • Opcode Fuzzy Hash: bd7d57daf28d972c1e9e64121000edac9a25b5704ece4759da822ac63d36521f
                                    • Instruction Fuzzy Hash: E751C0B1D003599FDB14CFA9C984ADEBBF5FF48310F24812AE819AB250D7759885CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1250 53e1dd0-53e1e36 1251 53e1e38-53e1e3e 1250->1251 1252 53e1e41-53e1e48 1250->1252 1251->1252 1253 53e1e4a-53e1e50 1252->1253 1254 53e1e53-53e1ef2 CreateWindowExW 1252->1254 1253->1254 1256 53e1efb-53e1f33 1254->1256 1257 53e1ef4-53e1efa 1254->1257 1261 53e1f35-53e1f38 1256->1261 1262 53e1f40 1256->1262 1257->1256 1261->1262 1263 53e1f41 1262->1263 1263->1263
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 053E1EE2
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: af6ee43667449b5bf294ae2e8fea23a519c1dac1c9b0f1c7f0240bc8661fe9d6
                                    • Instruction ID: 4aad6d63c5c478b91fb4288fe0089a32eff216242146573475ffec085b4d19fe
                                    • Opcode Fuzzy Hash: af6ee43667449b5bf294ae2e8fea23a519c1dac1c9b0f1c7f0240bc8661fe9d6
                                    • Instruction Fuzzy Hash: 1C41AFB1D003599FDB14CF99C984ADEBBF5BF88310F24812AE819AB250D775A845CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1264 12c7364-12c736d 1265 12c7370-12c7431 CreateActCtxA 1264->1265 1267 12c743a-12c7494 1265->1267 1268 12c7433-12c7439 1265->1268 1275 12c7496-12c7499 1267->1275 1276 12c74a3-12c74a7 1267->1276 1268->1267 1275->1276 1277 12c74b8 1276->1277 1278 12c74a9-12c74b5 1276->1278 1280 12c74b9 1277->1280 1278->1277 1280->1280
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 012C7421
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080775142.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_12c0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 7d829ce995c09c2ed89970220e7e9340b01bf3a4a035949918ca7631d65d0693
                                    • Instruction ID: d38739901086f7e13958f6f9f22962c8a2ca051516fb4c8d4fc2238f0b197fad
                                    • Opcode Fuzzy Hash: 7d829ce995c09c2ed89970220e7e9340b01bf3a4a035949918ca7631d65d0693
                                    • Instruction Fuzzy Hash: 6C41EEB0C00619CFDB24CFA9C844B8DFBB6FF49704F20816AD518AB251DB75694ACF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1281 53e5a6c-53eb4ac 1284 53eb4ae-53eb4b1 1281->1284 1285 53eb4b2-53eb4f1 1281->1285 1292 53eb534-53eb59a SendMessageW 1285->1292 1293 53eb4f3-53eb514 call 53e4630 call 53e9dc0 1285->1293 1294 53eb59c-53eb5a2 1292->1294 1295 53eb5a3-53eb5b7 1292->1295 1301 53eb519-53eb51c 1293->1301 1294->1295
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a692ba787467083555fd9a0d53dd2a021ffd32011c17935f6848b5df8ba83916
                                    • Instruction ID: 5580ded156e1ce7db3804c3a26b3beee4297b538773c9046e36ab13a255e4815
                                    • Opcode Fuzzy Hash: a692ba787467083555fd9a0d53dd2a021ffd32011c17935f6848b5df8ba83916
                                    • Instruction Fuzzy Hash: 2831C471A043189FCB10DF59D844AAEBFF9EF89310F14845AE509E7390C774A845CBA0
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 053E4411
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: 643a573e073c833fc65cffe15b8ce762d70faaad1abea54dd3bf8456704b82f8
                                    • Instruction ID: 3091a305543aa57981bb3cbc7adffb0620ede5e96ea598196162cbc606f49c34
                                    • Opcode Fuzzy Hash: 643a573e073c833fc65cffe15b8ce762d70faaad1abea54dd3bf8456704b82f8
                                    • Instruction Fuzzy Hash: DE4129B9A003198FCB14DF99C448AAABBF6FF88314F24C459D519A7361D775A841CFA0
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 012C7421
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080775142.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_12c0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 4fc42f50a07ae4b84832eb4f3bb70d1009042a56ac42623b90f4cc115eb36526
                                    • Instruction ID: cf4c0e56c32e8dbdaa35fd427eacabef6904e134608163da24ad95ef1105fb0a
                                    • Opcode Fuzzy Hash: 4fc42f50a07ae4b84832eb4f3bb70d1009042a56ac42623b90f4cc115eb36526
                                    • Instruction Fuzzy Hash: 3F41DFB0C0061DCADB24DFA9C844B9DFBF6FF48704F20816AD518AB255DBB56946CF90
                                    APIs
                                    • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 053EB227
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CreateFromIconResource
                                    • String ID:
                                    • API String ID: 3668623891-0
                                    • Opcode ID: 5683ddea36a2a33317aa3b1852fd6e5389c19d40285e5556c5e9e18e2c1e066f
                                    • Instruction ID: 6dba80fa9841d53dfbcf9e9e31b5ac77ba9230b54443b75e002b171dd0ce3b46
                                    • Opcode Fuzzy Hash: 5683ddea36a2a33317aa3b1852fd6e5389c19d40285e5556c5e9e18e2c1e066f
                                    • Instruction Fuzzy Hash: E231AAB29043589FCB12DFA9C944AAEBFF5EF09310F14805AE554A7261C339E954CBA0
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012C680F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080775142.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_12c0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 1b0f2a9891b778b536a6bbaff0e17ea41e5997426fe5c7d894146e326301b321
                                    • Instruction ID: 397d6d3936e29be1d2a64712d1a23bae5dc135e8005e0add8f5e13876776bfdb
                                    • Opcode Fuzzy Hash: 1b0f2a9891b778b536a6bbaff0e17ea41e5997426fe5c7d894146e326301b321
                                    • Instruction Fuzzy Hash: 232113B59002499FDB10CFAAD884AEEBFF9FF48310F14855AE914A3311D378A944CFA1
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012C680F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080775142.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_12c0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 8c5ce65e78fe7f8786bb9179fe5637aa60e3f2480f1aead725e4971b5a40a917
                                    • Instruction ID: c060088dd50099a2f1f1c30e06f1e4ff58f930d38d446973797dbf14cb81558e
                                    • Opcode Fuzzy Hash: 8c5ce65e78fe7f8786bb9179fe5637aa60e3f2480f1aead725e4971b5a40a917
                                    • Instruction Fuzzy Hash: 1A21C4B59002499FDB10CFAAD984ADEBFF9FB48310F14851AE918A3350D378A954CFA5
                                    APIs
                                    • EnumThreadWindows.USER32(?,00000000,?), ref: 053EE259
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: EnumThreadWindows
                                    • String ID:
                                    • API String ID: 2941952884-0
                                    • Opcode ID: 7d66c8cb66a41622a38adc6fde0eefbb717eae75e3b158ca68c64f6d7affeb3b
                                    • Instruction ID: 50dc51b1a05aa7794a99ee3d8b3a6d617e8f944df9e310f88ef43bbb933425db
                                    • Opcode Fuzzy Hash: 7d66c8cb66a41622a38adc6fde0eefbb717eae75e3b158ca68c64f6d7affeb3b
                                    • Instruction Fuzzy Hash: 242147719042198FDB14DF9AC844BEEFBF9FB88310F14842AE419A3290D778A945CFA1
                                    APIs
                                    • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 053EB227
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: CreateFromIconResource
                                    • String ID:
                                    • API String ID: 3668623891-0
                                    • Opcode ID: e6c6ecaf5784078803000bb3bc935abe1c793547de698280c2943b1cbbe99744
                                    • Instruction ID: 1fa02f1b6593c9f66509cf0cf8f9bb5e9b939e5de8f4c652d8d03a94f0ae3d08
                                    • Opcode Fuzzy Hash: e6c6ecaf5784078803000bb3bc935abe1c793547de698280c2943b1cbbe99744
                                    • Instruction Fuzzy Hash: 161146B58003499FDB10CFAAD844BEEBFF8EF48320F14841AE518A3250C379A950DFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 012CC256
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080775142.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_12c0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: d1dcafa116195ab54e1fcde450f4425128c2951fa54004615fbf4128bf8ed183
                                    • Instruction ID: 209d525dccd92b11ca2876db150471e9e75f45c8d549028ac99d9b56b776c401
                                    • Opcode Fuzzy Hash: d1dcafa116195ab54e1fcde450f4425128c2951fa54004615fbf4128bf8ed183
                                    • Instruction Fuzzy Hash: F0110FB5C002498FDB10DF9AC444A9EFBF9EB88610F14851AD629A7200C379A545CFA1
                                    APIs
                                    • SendMessageW.USER32(?,?,?,?), ref: 053EB58D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: c21fba836f260cd45363b3dcfceafd962ab8797cef6b43b5fdb6a2ae15101e2b
                                    • Instruction ID: d15c7861322b7337c064bae97846340c7fc11ef886fa3e6f9c9f7a78648b8cc3
                                    • Opcode Fuzzy Hash: c21fba836f260cd45363b3dcfceafd962ab8797cef6b43b5fdb6a2ae15101e2b
                                    • Instruction Fuzzy Hash: CE11F2B580035D9FDB10DF9AD544BEEFBF8EB48310F10845AE518A7240C3B9A944CFA1
                                    APIs
                                    • SendMessageW.USER32(?,?,?,?), ref: 053EB58D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 17ec47c92b3c42307817e92aa0f35d4dfb6b102ec8ddceafe9d4f6213402dde3
                                    • Instruction ID: 557ff135496e85345af9e4930bf07a4351c545b693493893dcdba57fc8c10f52
                                    • Opcode Fuzzy Hash: 17ec47c92b3c42307817e92aa0f35d4dfb6b102ec8ddceafe9d4f6213402dde3
                                    • Instruction Fuzzy Hash: 2B11D3B58003499FDB10DF9AD985BDEFBF8FB48324F148419E558A7240C379A944CFA1
                                    APIs
                                    • SetWindowLongW.USER32(?,?,?), ref: 053E2075
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: LongWindow
                                    • String ID:
                                    • API String ID: 1378638983-0
                                    • Opcode ID: 22e38f534a4ae7f97054994d27d86c0d3afce32cd4331edda60cde772a937f3d
                                    • Instruction ID: 66d4425ff893fd289606cf0e0f7a74701f7c0c39179373c2194e5c627cc05571
                                    • Opcode Fuzzy Hash: 22e38f534a4ae7f97054994d27d86c0d3afce32cd4331edda60cde772a937f3d
                                    • Instruction Fuzzy Hash: E51103B98002598FDB10DF99D585BEFBBF8FB48314F20845AE919A7241C378A944CFA1
                                    APIs
                                    • SetWindowLongW.USER32(?,?,?), ref: 053E2075
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2093755321.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_53e0000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID: LongWindow
                                    • String ID:
                                    • API String ID: 1378638983-0
                                    • Opcode ID: 5b51f3a46a4361d33c595ab59ea4e647b17e843c320da3bc4cfcef467f41b07e
                                    • Instruction ID: aef929ca08d5d7743c14a8f0638996f22c9940678a8ed6027cf1e05556000977
                                    • Opcode Fuzzy Hash: 5b51f3a46a4361d33c595ab59ea4e647b17e843c320da3bc4cfcef467f41b07e
                                    • Instruction Fuzzy Hash: FE1100B58002498FDB10DF9AC584BDFBBF8EB48320F20841AE919A3240C379A944CFA1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080200414.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10ed000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 726f1458932393d82291f92a4d090414714b48280ec6836300aa0043d7f56be2
                                    • Instruction ID: 01af1e3fb8f514865df9ec75464c24ad2774a619ede0321ea03a04bca970298a
                                    • Opcode Fuzzy Hash: 726f1458932393d82291f92a4d090414714b48280ec6836300aa0043d7f56be2
                                    • Instruction Fuzzy Hash: 49212571604200DFCB15DF68D588B16BFE5FB84314F28C5ADE9890B256C33AD407CB61
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2080200414.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10ed000_doc_Zapytanie - Oferta KH 09281.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: abbb95b2db24be9c731221642a8e9a786d331357ba67601458f9a9b12d8617b5
                                    • Instruction ID: 0dd762e0d7ac707259e04f6a97e053007c57851d98fb4214def597a086a8fedb
                                    • Opcode Fuzzy Hash: abbb95b2db24be9c731221642a8e9a786d331357ba67601458f9a9b12d8617b5
                                    • Instruction Fuzzy Hash: E02184755093808FDB13CF64D994715BFB1FB46214F28C5DAD8898F6A7C33A980ACB62

                                    Execution Graph

                                    Execution Coverage:9.2%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:308
                                    Total number of Limit Nodes:14
                                    execution_graph 33031 ddd01c 33032 ddd034 33031->33032 33033 ddd08e 33032->33033 33038 5072849 33032->33038 33043 5071ae8 33032->33043 33048 5071ad8 33032->33048 33053 5072858 33032->33053 33039 5072858 33038->33039 33040 50728b7 33039->33040 33058 5072dc3 33039->33058 33063 5072de8 33039->33063 33044 5071b0e 33043->33044 33046 5072849 2 API calls 33044->33046 33047 5072858 2 API calls 33044->33047 33045 5071b2f 33045->33033 33046->33045 33047->33045 33049 5071ae8 33048->33049 33051 5072849 2 API calls 33049->33051 33052 5072858 2 API calls 33049->33052 33050 5071b2f 33050->33033 33051->33050 33052->33050 33054 5072885 33053->33054 33055 50728b7 33054->33055 33056 5072dc3 2 API calls 33054->33056 33057 5072de8 2 API calls 33054->33057 33056->33055 33057->33055 33060 5072dea 33058->33060 33059 5072e88 33059->33040 33068 5072e90 33060->33068 33072 5072ea0 33060->33072 33065 5072dfc 33063->33065 33064 5072e88 33064->33040 33066 5072e90 2 API calls 33065->33066 33067 5072ea0 2 API calls 33065->33067 33066->33064 33067->33064 33069 5072ea0 33068->33069 33070 5072eb1 33069->33070 33075 5074056 33069->33075 33070->33059 33073 5072eb1 33072->33073 33074 5074056 2 API calls 33072->33074 33073->33059 33074->33073 33079 5074080 33075->33079 33083 5074090 33075->33083 33076 507407a 33076->33070 33080 5074090 33079->33080 33081 507412a CallWindowProcW 33080->33081 33082 50740d9 33080->33082 33081->33082 33082->33076 33084 50740d2 33083->33084 33086 50740d9 33083->33086 33085 507412a CallWindowProcW 33084->33085 33084->33086 33085->33086 33086->33076 33161 e3ad70 33164 e3ae59 33161->33164 33162 e3ad7f 33165 e3ae79 33164->33165 33166 e3ae9c 33164->33166 33165->33166 33167 e3b0a0 GetModuleHandleW 33165->33167 33166->33162 33168 e3b0cd 33167->33168 33168->33162 33186 e3d740 DuplicateHandle 33187 e3d7d6 33186->33187 33087 4bc6878 CloseHandle 33088 4bc68df 33087->33088 33169 4bc5368 33170 4bc538e 33169->33170 33171 4bc54f3 33169->33171 33170->33171 33173 4bc135c 33170->33173 33174 4bc55e8 PostMessageW 33173->33174 33175 4bc5654 33174->33175 33175->33170 33378 5077c30 33379 5077c5d 33378->33379 33396 50775fc 33379->33396 33383 5077cca 33384 507760c 2 API calls 33383->33384 33385 5077cfc 33384->33385 33386 507760c 2 API calls 33385->33386 33387 5077d2e 33386->33387 33404 507761c 33387->33404 33389 5077d60 33390 507760c 2 API calls 33389->33390 33391 5077dc4 33390->33391 33392 50775fc 2 API calls 33391->33392 33393 5077df6 33392->33393 33394 507761c 2 API calls 33393->33394 33395 5077e8c 33394->33395 33397 5077607 33396->33397 33408 5077900 33397->33408 33399 5077c98 33400 507760c 33399->33400 33401 5077617 33400->33401 33402 5077900 2 API calls 33401->33402 33403 507a141 33402->33403 33403->33383 33405 5077627 33404->33405 33417 5077b4c 33405->33417 33407 507a94f 33407->33389 33409 507790b 33408->33409 33412 e35cec 2 API calls 33409->33412 33413 e383c8 33409->33413 33410 5079e9c 33410->33399 33412->33410 33415 e38403 33413->33415 33414 e386c9 33414->33410 33415->33414 33416 e3ce20 2 API calls 33415->33416 33416->33414 33418 5077b57 33417->33418 33419 507a982 33418->33419 33420 e383c8 2 API calls 33418->33420 33421 e35cec 2 API calls 33418->33421 33419->33407 33420->33419 33421->33419 33089 e34668 33090 e3467a 33089->33090 33091 e34686 33090->33091 33095 e34778 33090->33095 33100 e34204 33091->33100 33093 e346a5 33096 e3479d 33095->33096 33104 e34888 33096->33104 33108 e34878 33096->33108 33101 e3420f 33100->33101 33116 e35c6c 33101->33116 33103 e3709e 33103->33093 33106 e348af 33104->33106 33105 e3498c 33106->33105 33112 e344e4 33106->33112 33109 e34888 33108->33109 33110 e3498c 33109->33110 33111 e344e4 CreateActCtxA 33109->33111 33110->33110 33111->33110 33113 e35918 CreateActCtxA 33112->33113 33115 e359db 33113->33115 33117 e35c77 33116->33117 33120 e35c8c 33117->33120 33119 e371ad 33119->33103 33121 e35c97 33120->33121 33124 e35cbc 33121->33124 33123 e37282 33123->33119 33125 e35cc7 33124->33125 33128 e35cec 33125->33128 33127 e37385 33127->33123 33129 e35cf7 33128->33129 33130 e386c9 33129->33130 33132 e3ce20 33129->33132 33130->33127 33133 e3ce51 33132->33133 33134 e3ce75 33133->33134 33137 e3cfcf 33133->33137 33141 e3cfe0 33133->33141 33134->33130 33138 e3cfe0 33137->33138 33139 e3d027 33138->33139 33145 e3b840 33138->33145 33139->33134 33142 e3cfed 33141->33142 33143 e3d027 33142->33143 33144 e3b840 2 API calls 33142->33144 33143->33134 33144->33143 33146 e3b84b 33145->33146 33148 e3dd38 33146->33148 33149 e3d144 33146->33149 33148->33148 33150 e3d14f 33149->33150 33151 e35cec 2 API calls 33150->33151 33152 e3dda7 33151->33152 33155 e3fb28 33152->33155 33153 e3dde1 33153->33148 33156 e3fb59 33155->33156 33158 e3fc59 33155->33158 33157 e3fb65 33156->33157 33159 50709f8 CreateWindowExW CreateWindowExW 33156->33159 33160 5070a08 CreateWindowExW CreateWindowExW 33156->33160 33157->33153 33158->33153 33159->33158 33160->33158 33176 e3d4f8 33177 e3d53e GetCurrentProcess 33176->33177 33179 e3d590 GetCurrentThread 33177->33179 33180 e3d589 33177->33180 33181 e3d5c6 33179->33181 33182 e3d5cd GetCurrentProcess 33179->33182 33180->33179 33181->33182 33185 e3d603 33182->33185 33183 e3d62b GetCurrentThreadId 33184 e3d65c 33183->33184 33185->33183 33188 4bc3712 33189 4bc3718 33188->33189 33194 4bc41b6 33189->33194 33202 4bc4140 33189->33202 33208 4bc4150 33189->33208 33190 4bc3729 33196 4bc4144 33194->33196 33198 4bc41b9 33194->33198 33195 4bc40fa 33195->33190 33196->33195 33214 4bc4470 33196->33214 33229 4bc44a0 33196->33229 33245 4bc4461 33196->33245 33197 4bc4172 33197->33190 33203 4bc416a 33202->33203 33205 4bc44a0 12 API calls 33203->33205 33206 4bc4470 12 API calls 33203->33206 33207 4bc4461 12 API calls 33203->33207 33204 4bc4172 33204->33190 33205->33204 33206->33204 33207->33204 33209 4bc416a 33208->33209 33211 4bc44a0 12 API calls 33209->33211 33212 4bc4470 12 API calls 33209->33212 33213 4bc4461 12 API calls 33209->33213 33210 4bc4172 33210->33190 33211->33210 33212->33210 33213->33210 33215 4bc4485 33214->33215 33222 4bc4497 33215->33222 33260 4bc467c 33215->33260 33266 4bc4583 33215->33266 33271 4bc4f48 33215->33271 33275 4bc464f 33215->33275 33280 4bc4a8f 33215->33280 33284 4bc4e4c 33215->33284 33288 4bc4750 33215->33288 33293 4bc4715 33215->33293 33298 4bc4a3b 33215->33298 33306 4bc491f 33215->33306 33310 4bc47bf 33215->33310 33315 4bc461e 33215->33315 33222->33197 33230 4bc4459 33229->33230 33231 4bc44a6 33229->33231 33232 4bc467c 2 API calls 33230->33232 33233 4bc461e 2 API calls 33230->33233 33234 4bc47bf 2 API calls 33230->33234 33235 4bc491f 2 API calls 33230->33235 33236 4bc4a3b 4 API calls 33230->33236 33237 4bc4715 2 API calls 33230->33237 33238 4bc4497 33230->33238 33239 4bc4750 2 API calls 33230->33239 33240 4bc4e4c 2 API calls 33230->33240 33241 4bc4a8f 2 API calls 33230->33241 33242 4bc464f 2 API calls 33230->33242 33243 4bc4f48 2 API calls 33230->33243 33244 4bc4583 2 API calls 33230->33244 33232->33238 33233->33238 33234->33238 33235->33238 33236->33238 33237->33238 33238->33197 33239->33238 33240->33238 33241->33238 33242->33238 33243->33238 33244->33238 33246 4bc4485 33245->33246 33247 4bc467c 2 API calls 33246->33247 33248 4bc4497 33246->33248 33249 4bc461e 2 API calls 33246->33249 33250 4bc47bf 2 API calls 33246->33250 33251 4bc491f 2 API calls 33246->33251 33252 4bc4a3b 4 API calls 33246->33252 33253 4bc4715 2 API calls 33246->33253 33254 4bc4750 2 API calls 33246->33254 33255 4bc4e4c 2 API calls 33246->33255 33256 4bc4a8f 2 API calls 33246->33256 33257 4bc464f 2 API calls 33246->33257 33258 4bc4f48 2 API calls 33246->33258 33259 4bc4583 2 API calls 33246->33259 33247->33248 33248->33197 33249->33248 33250->33248 33251->33248 33252->33248 33253->33248 33254->33248 33255->33248 33256->33248 33257->33248 33258->33248 33259->33248 33261 4bc4682 33260->33261 33262 4bc5118 33261->33262 33320 4bc322e 33261->33320 33324 4bc3238 33261->33324 33267 4bc45bc 33266->33267 33269 4bc322e CreateProcessA 33267->33269 33270 4bc3238 CreateProcessA 33267->33270 33268 4bc46c2 33268->33222 33269->33268 33270->33268 33328 4bc2faa 33271->33328 33332 4bc2fb0 33271->33332 33272 4bc4f76 33276 4bc4652 33275->33276 33278 4bc322e CreateProcessA 33276->33278 33279 4bc3238 CreateProcessA 33276->33279 33277 4bc46c2 33277->33222 33278->33277 33279->33277 33282 4bc2faa WriteProcessMemory 33280->33282 33283 4bc2fb0 WriteProcessMemory 33280->33283 33281 4bc4ab7 33281->33222 33282->33281 33283->33281 33336 4bc3098 33284->33336 33340 4bc30a0 33284->33340 33285 4bc4e6e 33289 4bc4ba8 33288->33289 33344 4bc2e18 33289->33344 33348 4bc2e12 33289->33348 33290 4bc4b39 33290->33222 33294 4bc4722 33293->33294 33352 4bc2928 33294->33352 33356 4bc2930 33294->33356 33295 4bc4de3 33360 4bc520f 33298->33360 33365 4bc5220 33298->33365 33299 4bc4e0f 33299->33222 33300 4bc47d7 33300->33299 33304 4bc2faa WriteProcessMemory 33300->33304 33305 4bc2fb0 WriteProcessMemory 33300->33305 33301 4bc47f8 33301->33222 33304->33301 33305->33301 33308 4bc2e18 Wow64SetThreadContext 33306->33308 33309 4bc2e12 Wow64SetThreadContext 33306->33309 33307 4bc4939 33308->33307 33309->33307 33311 4bc47d7 33310->33311 33313 4bc2faa WriteProcessMemory 33311->33313 33314 4bc2fb0 WriteProcessMemory 33311->33314 33312 4bc47f8 33312->33222 33313->33312 33314->33312 33316 4bc4584 33315->33316 33318 4bc322e CreateProcessA 33316->33318 33319 4bc3238 CreateProcessA 33316->33319 33317 4bc46c2 33317->33222 33318->33317 33319->33317 33321 4bc3237 CreateProcessA 33320->33321 33323 4bc3483 33321->33323 33325 4bc32c1 CreateProcessA 33324->33325 33327 4bc3483 33325->33327 33329 4bc2ff8 WriteProcessMemory 33328->33329 33331 4bc304f 33329->33331 33331->33272 33333 4bc2ff8 WriteProcessMemory 33332->33333 33335 4bc304f 33333->33335 33335->33272 33337 4bc30eb ReadProcessMemory 33336->33337 33339 4bc312f 33337->33339 33339->33285 33341 4bc30eb ReadProcessMemory 33340->33341 33343 4bc312f 33341->33343 33343->33285 33345 4bc2e5d Wow64SetThreadContext 33344->33345 33347 4bc2ea5 33345->33347 33347->33290 33349 4bc2e5d Wow64SetThreadContext 33348->33349 33351 4bc2ea5 33349->33351 33351->33290 33353 4bc2970 ResumeThread 33352->33353 33355 4bc29a1 33353->33355 33355->33295 33357 4bc2970 ResumeThread 33356->33357 33359 4bc29a1 33357->33359 33359->33295 33361 4bc5235 33360->33361 33370 4bc2eea 33361->33370 33374 4bc2ef0 33361->33374 33362 4bc5254 33362->33300 33366 4bc5235 33365->33366 33368 4bc2eea VirtualAllocEx 33366->33368 33369 4bc2ef0 VirtualAllocEx 33366->33369 33367 4bc5254 33367->33300 33368->33367 33369->33367 33371 4bc2f30 VirtualAllocEx 33370->33371 33373 4bc2f6d 33371->33373 33373->33362 33375 4bc2f30 VirtualAllocEx 33374->33375 33377 4bc2f6d 33375->33377 33377->33362

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 296 e3d4e8-e3d587 GetCurrentProcess 300 e3d590-e3d5c4 GetCurrentThread 296->300 301 e3d589-e3d58f 296->301 302 e3d5c6-e3d5cc 300->302 303 e3d5cd-e3d601 GetCurrentProcess 300->303 301->300 302->303 304 e3d603-e3d609 303->304 305 e3d60a-e3d625 call e3d6c7 303->305 304->305 309 e3d62b-e3d65a GetCurrentThreadId 305->309 310 e3d663-e3d6c5 309->310 311 e3d65c-e3d662 309->311 311->310
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00E3D576
                                    • GetCurrentThread.KERNEL32 ref: 00E3D5B3
                                    • GetCurrentProcess.KERNEL32 ref: 00E3D5F0
                                    • GetCurrentThreadId.KERNEL32 ref: 00E3D649
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2095042162.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_e30000_workbook.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 5a37421cf5e0d9a4f6adf2950c3111e798649921b6b6bacf6fbd6b6d42a1fc5b
                                    • Instruction ID: 961b042b49900da24fecd67d7579c8410c44e0cf3c182ddfb8f7db07b3785fbf
                                    • Opcode Fuzzy Hash: 5a37421cf5e0d9a4f6adf2950c3111e798649921b6b6bacf6fbd6b6d42a1fc5b
                                    • Instruction Fuzzy Hash: 8D5147B0904309CFDB04DFA9D588B9EBFF1FF88304F248469E019A72A1D7789944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 318 e3d4f8-e3d587 GetCurrentProcess 322 e3d590-e3d5c4 GetCurrentThread 318->322 323 e3d589-e3d58f 318->323 324 e3d5c6-e3d5cc 322->324 325 e3d5cd-e3d601 GetCurrentProcess 322->325 323->322 324->325 326 e3d603-e3d609 325->326 327 e3d60a-e3d625 call e3d6c7 325->327 326->327 331 e3d62b-e3d65a GetCurrentThreadId 327->331 332 e3d663-e3d6c5 331->332 333 e3d65c-e3d662 331->333 333->332
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00E3D576
                                    • GetCurrentThread.KERNEL32 ref: 00E3D5B3
                                    • GetCurrentProcess.KERNEL32 ref: 00E3D5F0
                                    • GetCurrentThreadId.KERNEL32 ref: 00E3D649
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2095042162.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_e30000_workbook.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: dee91e2df1bd593d33322414eadf7f1b0474aabf37cf100042b8923a1d7a74cb
                                    • Instruction ID: 24a35f419e76c548439a244be9d0f9b50f8bb569072db82d259a3a619e649581
                                    • Opcode Fuzzy Hash: dee91e2df1bd593d33322414eadf7f1b0474aabf37cf100042b8923a1d7a74cb
                                    • Instruction Fuzzy Hash: 9B5136B0900209CFDB14DFA9D988B9EBFF5FF88314F208459E019A72A1D7749944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1358 4bc322e-4bc3235 1359 4bc329d-4bc32cd 1358->1359 1360 4bc3237-4bc329c 1358->1360 1362 4bc32cf-4bc32d9 1359->1362 1363 4bc3306-4bc3326 1359->1363 1360->1359 1362->1363 1364 4bc32db-4bc32dd 1362->1364 1368 4bc335f-4bc338e 1363->1368 1369 4bc3328-4bc3332 1363->1369 1366 4bc32df-4bc32e9 1364->1366 1367 4bc3300-4bc3303 1364->1367 1370 4bc32ed-4bc32fc 1366->1370 1371 4bc32eb 1366->1371 1367->1363 1379 4bc33c7-4bc3481 CreateProcessA 1368->1379 1380 4bc3390-4bc339a 1368->1380 1369->1368 1372 4bc3334-4bc3336 1369->1372 1370->1370 1373 4bc32fe 1370->1373 1371->1370 1374 4bc3338-4bc3342 1372->1374 1375 4bc3359-4bc335c 1372->1375 1373->1367 1377 4bc3344 1374->1377 1378 4bc3346-4bc3355 1374->1378 1375->1368 1377->1378 1378->1378 1381 4bc3357 1378->1381 1391 4bc348a-4bc3510 1379->1391 1392 4bc3483-4bc3489 1379->1392 1380->1379 1382 4bc339c-4bc339e 1380->1382 1381->1375 1384 4bc33a0-4bc33aa 1382->1384 1385 4bc33c1-4bc33c4 1382->1385 1386 4bc33ac 1384->1386 1387 4bc33ae-4bc33bd 1384->1387 1385->1379 1386->1387 1387->1387 1388 4bc33bf 1387->1388 1388->1385 1402 4bc3520-4bc3524 1391->1402 1403 4bc3512-4bc3516 1391->1403 1392->1391 1405 4bc3534-4bc3538 1402->1405 1406 4bc3526-4bc352a 1402->1406 1403->1402 1404 4bc3518 1403->1404 1404->1402 1407 4bc3548-4bc354c 1405->1407 1408 4bc353a-4bc353e 1405->1408 1406->1405 1409 4bc352c 1406->1409 1411 4bc355e-4bc3565 1407->1411 1412 4bc354e-4bc3554 1407->1412 1408->1407 1410 4bc3540 1408->1410 1409->1405 1410->1407 1413 4bc357c 1411->1413 1414 4bc3567-4bc3576 1411->1414 1412->1411 1416 4bc357d 1413->1416 1414->1413 1416->1416
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04BC346E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: d093613b4ecbde54eec506139fce1e3b74e624b81f55874cf79a2994850252d5
                                    • Instruction ID: a031896ec8c447c77c5fa93846ceefd6f1a313575e4b072d8275d31fc48d23ea
                                    • Opcode Fuzzy Hash: d093613b4ecbde54eec506139fce1e3b74e624b81f55874cf79a2994850252d5
                                    • Instruction Fuzzy Hash: 3CA14971D002199FEB24CFA8C881BEDBBF2FF44314F5495A9E809A7240DB75A985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1417 4bc3238-4bc32cd 1419 4bc32cf-4bc32d9 1417->1419 1420 4bc3306-4bc3326 1417->1420 1419->1420 1421 4bc32db-4bc32dd 1419->1421 1425 4bc335f-4bc338e 1420->1425 1426 4bc3328-4bc3332 1420->1426 1423 4bc32df-4bc32e9 1421->1423 1424 4bc3300-4bc3303 1421->1424 1427 4bc32ed-4bc32fc 1423->1427 1428 4bc32eb 1423->1428 1424->1420 1436 4bc33c7-4bc3481 CreateProcessA 1425->1436 1437 4bc3390-4bc339a 1425->1437 1426->1425 1429 4bc3334-4bc3336 1426->1429 1427->1427 1430 4bc32fe 1427->1430 1428->1427 1431 4bc3338-4bc3342 1429->1431 1432 4bc3359-4bc335c 1429->1432 1430->1424 1434 4bc3344 1431->1434 1435 4bc3346-4bc3355 1431->1435 1432->1425 1434->1435 1435->1435 1438 4bc3357 1435->1438 1448 4bc348a-4bc3510 1436->1448 1449 4bc3483-4bc3489 1436->1449 1437->1436 1439 4bc339c-4bc339e 1437->1439 1438->1432 1441 4bc33a0-4bc33aa 1439->1441 1442 4bc33c1-4bc33c4 1439->1442 1443 4bc33ac 1441->1443 1444 4bc33ae-4bc33bd 1441->1444 1442->1436 1443->1444 1444->1444 1445 4bc33bf 1444->1445 1445->1442 1459 4bc3520-4bc3524 1448->1459 1460 4bc3512-4bc3516 1448->1460 1449->1448 1462 4bc3534-4bc3538 1459->1462 1463 4bc3526-4bc352a 1459->1463 1460->1459 1461 4bc3518 1460->1461 1461->1459 1464 4bc3548-4bc354c 1462->1464 1465 4bc353a-4bc353e 1462->1465 1463->1462 1466 4bc352c 1463->1466 1468 4bc355e-4bc3565 1464->1468 1469 4bc354e-4bc3554 1464->1469 1465->1464 1467 4bc3540 1465->1467 1466->1462 1467->1464 1470 4bc357c 1468->1470 1471 4bc3567-4bc3576 1468->1471 1469->1468 1473 4bc357d 1470->1473 1471->1470 1473->1473
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04BC346E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 977bf85bc6c79ca2d97c021b8c1386bbceb80f455352d3e313fc83d0b7f16798
                                    • Instruction ID: b65acb4a47d335a25c805cd5b5bb4861715e2bb0b11d7e9f09364cfaf9f3718f
                                    • Opcode Fuzzy Hash: 977bf85bc6c79ca2d97c021b8c1386bbceb80f455352d3e313fc83d0b7f16798
                                    • Instruction Fuzzy Hash: FC914971D002199FEB24CF68C881BEDBBF2FF48314F5485A9E809A7250DB75A985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1474 e3ae59-e3ae77 1475 e3aea3-e3aea7 1474->1475 1476 e3ae79-e3ae86 call e3a1c0 1474->1476 1478 e3aebb-e3aefc 1475->1478 1479 e3aea9-e3aeb3 1475->1479 1483 e3ae88 1476->1483 1484 e3ae9c 1476->1484 1485 e3af09-e3af17 1478->1485 1486 e3aefe-e3af06 1478->1486 1479->1478 1529 e3ae8e call e3b0f0 1483->1529 1530 e3ae8e call e3b100 1483->1530 1484->1475 1487 e3af3b-e3af3d 1485->1487 1488 e3af19-e3af1e 1485->1488 1486->1485 1493 e3af40-e3af47 1487->1493 1490 e3af20-e3af27 call e3a1cc 1488->1490 1491 e3af29 1488->1491 1489 e3ae94-e3ae96 1489->1484 1492 e3afd8-e3b098 1489->1492 1497 e3af2b-e3af39 1490->1497 1491->1497 1524 e3b0a0-e3b0cb GetModuleHandleW 1492->1524 1525 e3b09a-e3b09d 1492->1525 1494 e3af54-e3af5b 1493->1494 1495 e3af49-e3af51 1493->1495 1498 e3af68-e3af71 call e3a1dc 1494->1498 1499 e3af5d-e3af65 1494->1499 1495->1494 1497->1493 1505 e3af73-e3af7b 1498->1505 1506 e3af7e-e3af83 1498->1506 1499->1498 1505->1506 1507 e3afa1-e3afae 1506->1507 1508 e3af85-e3af8c 1506->1508 1514 e3afd1-e3afd7 1507->1514 1515 e3afb0-e3afce 1507->1515 1508->1507 1510 e3af8e-e3af9e call e3a1ec call e3a1fc 1508->1510 1510->1507 1515->1514 1526 e3b0d4-e3b0e8 1524->1526 1527 e3b0cd-e3b0d3 1524->1527 1525->1524 1527->1526 1529->1489 1530->1489
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00E3B0BE
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2095042162.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_e30000_workbook.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 8ce6c48d5fd2dc321f1712f0868844587e7c3b46be3a924611147d2ce231ce92
                                    • Instruction ID: 153e339d0e158431983bd7d0821a11586e9db78f8cb57922bbdcff1cecbdab40
                                    • Opcode Fuzzy Hash: 8ce6c48d5fd2dc321f1712f0868844587e7c3b46be3a924611147d2ce231ce92
                                    • Instruction Fuzzy Hash: 078168B0A00B458FD724DF29D4597AABBF1FF88304F148A2DE486D7A50D735E885CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1531 5071924-5071996 1533 50719a1-50719a8 1531->1533 1534 5071998-507199e 1531->1534 1535 50719b3-5071a52 CreateWindowExW 1533->1535 1536 50719aa-50719b0 1533->1536 1534->1533 1538 5071a54-5071a5a 1535->1538 1539 5071a5b-5071a93 1535->1539 1536->1535 1538->1539 1543 5071a95-5071a98 1539->1543 1544 5071aa0 1539->1544 1543->1544 1545 5071aa1 1544->1545 1545->1545
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05071A42
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2114547015.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5070000_workbook.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: cba5db07c6f12a379518bc104a114f1076ff79e457efdff95f0d26c6f663e3c7
                                    • Instruction ID: 67bfd4c478952d052c50466c0df43d3d4034bf5786ed87ab7fbe427893afccbf
                                    • Opcode Fuzzy Hash: cba5db07c6f12a379518bc104a114f1076ff79e457efdff95f0d26c6f663e3c7
                                    • Instruction Fuzzy Hash: 8C51C0B1D00349EFDB14CF99D884ADEBBF6BF48310F24812AE819AB250D7759985CF94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1546 5071930-5071996 1547 50719a1-50719a8 1546->1547 1548 5071998-507199e 1546->1548 1549 50719b3-5071a52 CreateWindowExW 1547->1549 1550 50719aa-50719b0 1547->1550 1548->1547 1552 5071a54-5071a5a 1549->1552 1553 5071a5b-5071a93 1549->1553 1550->1549 1552->1553 1557 5071a95-5071a98 1553->1557 1558 5071aa0 1553->1558 1557->1558 1559 5071aa1 1558->1559 1559->1559
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05071A42
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2114547015.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5070000_workbook.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: db46ee5b5cd955f58bc20c818496dbf2ac55802029495b733426d29cad74e3a9
                                    • Instruction ID: 6343760c9c18207928494d88e51422fc91ffefd57edf71048a61ae2482eba498
                                    • Opcode Fuzzy Hash: db46ee5b5cd955f58bc20c818496dbf2ac55802029495b733426d29cad74e3a9
                                    • Instruction Fuzzy Hash: 3F41C0B1D00309EFDB14CF99D884ADEBBF6BF48310F24812AE819AB250D774A945CF94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1560 e3590d-e359d9 CreateActCtxA 1562 e359e2-e35a3c 1560->1562 1563 e359db-e359e1 1560->1563 1570 e35a4b-e35a4f 1562->1570 1571 e35a3e-e35a41 1562->1571 1563->1562 1572 e35a51-e35a5d 1570->1572 1573 e35a60 1570->1573 1571->1570 1572->1573 1575 e35a61 1573->1575 1575->1575
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 00E359C9
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2095042162.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_e30000_workbook.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 393bee54b5b2ead70092ffd3b34a85357242193c47eac4540a23110c67a40d13
                                    • Instruction ID: acc7e952f332716fbb1906e3fdbfc1b6d2395ce29fba00c5c87387af48b72278
                                    • Opcode Fuzzy Hash: 393bee54b5b2ead70092ffd3b34a85357242193c47eac4540a23110c67a40d13
                                    • Instruction Fuzzy Hash: 5541F4B1C00619CEDB25CFA9C8897DDBBF5BF88304F20816AD418AB255D775594ACF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1576 e344e4-e359d9 CreateActCtxA 1579 e359e2-e35a3c 1576->1579 1580 e359db-e359e1 1576->1580 1587 e35a4b-e35a4f 1579->1587 1588 e35a3e-e35a41 1579->1588 1580->1579 1589 e35a51-e35a5d 1587->1589 1590 e35a60 1587->1590 1588->1587 1589->1590 1592 e35a61 1590->1592 1592->1592
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 00E359C9
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2095042162.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_e30000_workbook.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 43fd27ed19db6d6d90170de72267f592c296f3cc78e8ebf1700dc1567252a8ef
                                    • Instruction ID: 407319d1b1585ca4066a1a05848268e2bfb634a27578ef203bcaa4cf819b988d
                                    • Opcode Fuzzy Hash: 43fd27ed19db6d6d90170de72267f592c296f3cc78e8ebf1700dc1567252a8ef
                                    • Instruction Fuzzy Hash: 3041E3B1C0071DCBDB24DFA9C888B9EBBF5BF88304F20816AD419AB255DB755945CF90
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 05074151
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2114547015.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5070000_workbook.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: c707d764c17030f12d97d6bfc715a3e056444b8e5616d32d9179e1e8afe86bd3
                                    • Instruction ID: 1e709591330c25c98c56dcf73b4cc813c1f3c77ae0b7e06c28577a75e687668a
                                    • Opcode Fuzzy Hash: c707d764c17030f12d97d6bfc715a3e056444b8e5616d32d9179e1e8afe86bd3
                                    • Instruction Fuzzy Hash: C0411AB5A002098FCB14DF99C888AAEFBF5FB98314F28C459D519A7321D374A841CFA4
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04BC3040
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 4a9b2883587468421a1226589890adffe78dae8c07d6a6a1475113e229027d40
                                    • Instruction ID: 385db0473458ea697c6022393fe863b648816e5ba3208a7e3a50495d3eef3096
                                    • Opcode Fuzzy Hash: 4a9b2883587468421a1226589890adffe78dae8c07d6a6a1475113e229027d40
                                    • Instruction Fuzzy Hash: BD213B719003099FCB10DFA9C885BDEBBF5FF48310F508429E919A7240C778A944CBA4
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04BC3040
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 83528a7273475d767ab96d6377ba1916f162f8e91c966b0db0c956eea18dc2d8
                                    • Instruction ID: 29be576767ed9bce2aa85990c478467f2a74d24b1adb5d46b2e4479a84523ed0
                                    • Opcode Fuzzy Hash: 83528a7273475d767ab96d6377ba1916f162f8e91c966b0db0c956eea18dc2d8
                                    • Instruction Fuzzy Hash: 6E2127B6D003099FCB10CFA9C985BEEBBF5FF48310F50842AE919A7240C7789944CBA4
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E3D7C7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2095042162.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_e30000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: a717a416dd26cd01ff8a23a257d81808c0ac0a4e2c56c523eb8fd0251c944a28
                                    • Instruction ID: d5795d74ad11b4e4057cec3abfde5a4de24d2998b22f6c5ced76bae9c0d0ce54
                                    • Opcode Fuzzy Hash: a717a416dd26cd01ff8a23a257d81808c0ac0a4e2c56c523eb8fd0251c944a28
                                    • Instruction Fuzzy Hash: 4B21E3B59002099FDB10CFAAD985ADEBFF9FB48710F14841AE918A3310C378A945CFA1
                                    APIs
                                    • Wow64SetThreadContext.KERNELBASE(?,00000000), ref: 04BC2E96
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: dde9d99b2bc0391f07bfeb0bb277fb2016981bb2cd634c98c831adb7b1be55ef
                                    • Instruction ID: d16559310532cedea25ce5220e3b4e0a4877a4e705eb9e6abb04f4a660cc2bab
                                    • Opcode Fuzzy Hash: dde9d99b2bc0391f07bfeb0bb277fb2016981bb2cd634c98c831adb7b1be55ef
                                    • Instruction Fuzzy Hash: AC2135B1D003098FDB14DFAAC485BEEBBF4EF48310F10846AD419A7240CB78A985CFA1
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04BC3120
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 8e5f6320a0c8989bd5424d198801f1bdc432b38e93e1e5e0981c12dcff468a16
                                    • Instruction ID: 28b4bd631b21c5bda7e1d243705436e40a0fbbc73eda8d920c475f05707345d0
                                    • Opcode Fuzzy Hash: 8e5f6320a0c8989bd5424d198801f1bdc432b38e93e1e5e0981c12dcff468a16
                                    • Instruction Fuzzy Hash: 1B2139B1C003499FCB10DFAAC881AEEFBF5FF48310F508429E919A7250C738A945CBA1
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04BC3120
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: f69ac5dca4846f1c4191689a03d335119504abd42103e69a3749f1f011459c91
                                    • Instruction ID: 6f0f12f8398f757e58705e7ad52f08f4bc3033b2f3776b5437cd94bebc975b39
                                    • Opcode Fuzzy Hash: f69ac5dca4846f1c4191689a03d335119504abd42103e69a3749f1f011459c91
                                    • Instruction Fuzzy Hash: 4D2125B1C002499FCB10DFAAC985BEEFBF5FF48310F50842AE959A7250C7389945CBA1
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E3D7C7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2095042162.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_e30000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 351d72f38d6ca83dff897a590379fee0b7e687f6e9c0ca15292408e738cc9cc9
                                    • Instruction ID: 8393be4e2118b657d1c139539a0dda450a444637ae6a7d973f8244c9da13e943
                                    • Opcode Fuzzy Hash: 351d72f38d6ca83dff897a590379fee0b7e687f6e9c0ca15292408e738cc9cc9
                                    • Instruction Fuzzy Hash: C121C2B59002489FDB10CFAAD984ADEBFF9FB48310F14841AE918A3350D378A944CFA5
                                    APIs
                                    • Wow64SetThreadContext.KERNELBASE(?,00000000), ref: 04BC2E96
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: e5d0847aa8720375e37ac73c22ec1939eae38b407bb42b34c536e45dc464e8a1
                                    • Instruction ID: f37c2cda81c61c439b6b3a24f3ab13d8845dc7fc5b3231029ebdddde50f5b3af
                                    • Opcode Fuzzy Hash: e5d0847aa8720375e37ac73c22ec1939eae38b407bb42b34c536e45dc464e8a1
                                    • Instruction Fuzzy Hash: 622137B1D00209CFDB14DFAAC5857EEBBF4EF48310F14846AD519A7240C778A945CBA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04BC2F5E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 65b6cf9740f5e24f694acbc02413ed5ecfd35cb8762f60e856e1cc842ef109f7
                                    • Instruction ID: af36d6c23607c84b6177169cf4a5c138df5700b5e3aadf76c1d01a582b3dd9ce
                                    • Opcode Fuzzy Hash: 65b6cf9740f5e24f694acbc02413ed5ecfd35cb8762f60e856e1cc842ef109f7
                                    • Instruction Fuzzy Hash: 921126718002499FCB14DFAAC845AEEBBF5FF48314F208459E519A7250CB79A544CBA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04BC2F5E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 4600a8128613a6f7a55bb77ca2d7bfc6c49a2ba71d472d4dfec10b9fabdcdad4
                                    • Instruction ID: b83d9608181e76cd4c890a6561f3e53217e4a1f2c8a1fa8692bf7897be3a60d2
                                    • Opcode Fuzzy Hash: 4600a8128613a6f7a55bb77ca2d7bfc6c49a2ba71d472d4dfec10b9fabdcdad4
                                    • Instruction Fuzzy Hash: C21167B6C002089FCB10DFA9C945BEEBBF5FF48310F208459E519A7250C739A540CFA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: aa757ee8efbddeffaeebb30cb7bc9dac79cf1815cd9a2d02c4b1e6def55065a9
                                    • Instruction ID: b8514fae2565180aaa68bef141105807bcee2c6f01243dd0a82491d8990606a1
                                    • Opcode Fuzzy Hash: aa757ee8efbddeffaeebb30cb7bc9dac79cf1815cd9a2d02c4b1e6def55065a9
                                    • Instruction Fuzzy Hash: DA1136B1D003488FDB24DFAAC4457EEFBF5EF88324F208469D519A7240CB79A945CBA5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 290d41e42ae9b4fc38af0c24a11147ea1c3306b0ded95d0be51e7222281c4a80
                                    • Instruction ID: d66777ef8cf67226c564a1f20b7daddd44015f77dcf95e3cf762fd63d08aa9a0
                                    • Opcode Fuzzy Hash: 290d41e42ae9b4fc38af0c24a11147ea1c3306b0ded95d0be51e7222281c4a80
                                    • Instruction Fuzzy Hash: 0B1158B1D003488FDB14DFA9C5457EEFBF4EF48310F208469C119A7240CB78A945CBA1
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00E3B0BE
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2095042162.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_e30000_workbook.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 92e703f160ebdd43f741b30c732040800d6399ed38e91c0ea167efc12c47074a
                                    • Instruction ID: 02cd66aaa44a0f1c6fc0ab7f77f0ba105e331c101057bdcbf86c435f42f63757
                                    • Opcode Fuzzy Hash: 92e703f160ebdd43f741b30c732040800d6399ed38e91c0ea167efc12c47074a
                                    • Instruction Fuzzy Hash: 0511DFB5C002498FCB24DF9AC548B9EFBF4EF88314F10846AD529B7650D379A545CFA1
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 04BC5645
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: a636308923375f4fd0613694c317fe72449ba2416da50e02ba049270df74adf5
                                    • Instruction ID: 38191b5d89dd123b27802b81c93146afa7a7dcaca78f67526844278788349916
                                    • Opcode Fuzzy Hash: a636308923375f4fd0613694c317fe72449ba2416da50e02ba049270df74adf5
                                    • Instruction Fuzzy Hash: 6111F2B58003499FDB20DF9AC885BDEBBF8FB48310F10845AE519A7210C379A944CFA1
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 04BC5645
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 9b7357c71a0525cdfd5c6682c78ce1371c6e6aacebb756a6443a7911a8ea8e88
                                    • Instruction ID: f55fce90431e8a66323827728128b12eeb16f19b93b690d1a95a0fe2043260b1
                                    • Opcode Fuzzy Hash: 9b7357c71a0525cdfd5c6682c78ce1371c6e6aacebb756a6443a7911a8ea8e88
                                    • Instruction Fuzzy Hash: A41115B58003499FDB20DF99C585BEEFBF4FB48310F20845AE558A3210C379A944CFA1
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 04BC68D0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 320547d6d357f3473e0e456e57630355a2aa49ed1900bc3d014cc53a69531806
                                    • Instruction ID: 4067f67840718923520c4d3290565809635ac69f998e342203afb79224cd7760
                                    • Opcode Fuzzy Hash: 320547d6d357f3473e0e456e57630355a2aa49ed1900bc3d014cc53a69531806
                                    • Instruction Fuzzy Hash: 371103B58002498FDB20DF9AC585BDEBBF4EB48320F20846AD558A7340D738A984CFA5
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 04BC68D0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2111214043.0000000004BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_4bc0000_workbook.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: a7871f9781b3cf744e25629c3a33206402f6a3997bc992a93f6af0a111f232d3
                                    • Instruction ID: 848ffaa15801bdf9b0d652609d0bf38d7e44dc0af9a9e94824b4c89a9a57dc06
                                    • Opcode Fuzzy Hash: a7871f9781b3cf744e25629c3a33206402f6a3997bc992a93f6af0a111f232d3
                                    • Instruction Fuzzy Hash: 1F1125B68002098FCB10DF99C585BDEBBF4EB48320F10845AD558A7341D338A944CFA5
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2093987856.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_dcd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8a4024feea1f245b852efc702253c0e5e3b3e92f860d799367ead7b209d96475
                                    • Instruction ID: 8beba1fae59725b1ff28023ea36bfd6414ac3ebdaa4c042c7a64058b74b7bb3e
                                    • Opcode Fuzzy Hash: 8a4024feea1f245b852efc702253c0e5e3b3e92f860d799367ead7b209d96475
                                    • Instruction Fuzzy Hash: CD21F171108205DFCB09DF14C9C0F26BB66EB98314F24817DEA090B256C33AE806CAB2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2094119642.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_ddd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eee0b3c8305af2a34b22d4337e3db7cc6bfcdf29b9e3c4f1b68c772c728b9897
                                    • Instruction ID: 603ce90000805e9d867a92526780f626acc64c7c34ee12373edfbf1f5c009d08
                                    • Opcode Fuzzy Hash: eee0b3c8305af2a34b22d4337e3db7cc6bfcdf29b9e3c4f1b68c772c728b9897
                                    • Instruction Fuzzy Hash: 5721D071604204DFCF14DF24D984B26BB66EB88314F24C56AE94A4B396C33AD80ACAB1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2094119642.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_ddd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 912dd606112f87e65619e64218d40b94e8c75db41aa6879e0fc383a8c7b37c4a
                                    • Instruction ID: 0e4be48c1b8ec717399c6d7bda45c0accef01806e9b14f485ef38aad5f836e64
                                    • Opcode Fuzzy Hash: 912dd606112f87e65619e64218d40b94e8c75db41aa6879e0fc383a8c7b37c4a
                                    • Instruction Fuzzy Hash: 7621D071544204AFDF15DF64D980F26BFA6FB88314F24C56AE9494B396C33AD806CA71
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2094119642.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_ddd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: acea2128fac930488f875100eb0d502bc5a22ee1111c17c2ce81e56b897d1413
                                    • Instruction ID: 47971672b64d8237971f794de598089d680bbeebfa913a22f05a8efba47f7588
                                    • Opcode Fuzzy Hash: acea2128fac930488f875100eb0d502bc5a22ee1111c17c2ce81e56b897d1413
                                    • Instruction Fuzzy Hash: 762153755093808FDB12CF24D994715BF71EB46314F29C5EBD8498B6A7C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2093987856.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_dcd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 3a7bdbaf166aeb2fba106dc7c887cfe9d180b8a40ced95cbe1b5c7806ce0402b
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 9D110372404240DFCB06CF00D9C4B16BF72FB94324F28C6ADD9090B256C33AE85ACBA2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2094119642.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_ddd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction ID: ebb38e32d7dfe8af98124ec624700a933135d1476cf44c29ba610fdfb5801308
                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction Fuzzy Hash: 5F118B75504280DFDB16CF14D5C4B15BFB2FB84314F28C6AAD8494B796C33AD84ACB62
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2093987856.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_dcd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2563637765870a9bf9022e3a9dd99ea590d1ed39ef7bc3cb5f86b75c7f26c1e7
                                    • Instruction ID: 9ac3d04e35996fe22540bb95c4a184cff85dfe2b992326fb141cb997be64cb1c
                                    • Opcode Fuzzy Hash: 2563637765870a9bf9022e3a9dd99ea590d1ed39ef7bc3cb5f86b75c7f26c1e7
                                    • Instruction Fuzzy Hash: B701F2310043419AE7209E29CD84F66BF9CEF46320F28C53EED4A0B2C6C2799801CAB1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2093987856.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_dcd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ab7e9412357aa2328024116165989778ba0467f7a7306c97f103b00b6e82869
                                    • Instruction ID: 535b2dcf266ebde0c9fe39629ad56fbc4812cd2f4262e06068eb393a11e79a30
                                    • Opcode Fuzzy Hash: 9ab7e9412357aa2328024116165989778ba0467f7a7306c97f103b00b6e82869
                                    • Instruction Fuzzy Hash: BDF06271404344AAEB108E16CC88B62FF98EF55734F28C56AED494B2D6C2799C44CBB1

                                    Execution Graph

                                    Execution Coverage:9.4%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:177
                                    Total number of Limit Nodes:9
                                    execution_graph 20515 2e16750 CloseHandle 20516 2e167b7 20515->20516 20492 14a4668 20493 14a467a 20492->20493 20494 14a4686 20493->20494 20496 14a4778 20493->20496 20497 14a479d 20496->20497 20501 14a4878 20497->20501 20505 14a4888 20497->20505 20503 14a48af 20501->20503 20502 14a498c 20502->20502 20503->20502 20509 14a44e4 20503->20509 20506 14a48af 20505->20506 20507 14a498c 20506->20507 20508 14a44e4 CreateActCtxA 20506->20508 20507->20507 20508->20507 20510 14a5918 CreateActCtxA 20509->20510 20512 14a59db 20510->20512 20517 14ad4f8 20518 14ad53e 20517->20518 20522 14ad6d8 20518->20522 20525 14ad6c7 20518->20525 20519 14ad62b 20529 14ab850 20522->20529 20526 14ad6d8 20525->20526 20527 14ab850 DuplicateHandle 20526->20527 20528 14ad706 20527->20528 20528->20519 20530 14ad740 DuplicateHandle 20529->20530 20531 14ad706 20530->20531 20531->20519 20532 2e138d5 20533 2e13654 20532->20533 20534 2e13729 20533->20534 20538 2e14020 20533->20538 20543 2e14086 20533->20543 20549 2e14010 20533->20549 20539 2e1403a 20538->20539 20554 2e14330 20539->20554 20571 2e142d8 20539->20571 20540 2e14042 20540->20534 20544 2e14014 20543->20544 20546 2e14089 20543->20546 20547 2e14330 12 API calls 20544->20547 20548 2e142d8 12 API calls 20544->20548 20545 2e14042 20545->20534 20547->20545 20548->20545 20550 2e1401e 20549->20550 20552 2e14330 12 API calls 20550->20552 20553 2e142d8 12 API calls 20550->20553 20551 2e14042 20551->20534 20552->20551 20553->20551 20555 2e14334 20554->20555 20556 2e14367 20555->20556 20588 2e14620 20555->20588 20593 2e1495f 20555->20593 20597 2e1451f 20555->20597 20602 2e14d1c 20555->20602 20606 2e149fa 20555->20606 20611 2e14e18 20555->20611 20615 2e14453 20555->20615 20620 2e144ee 20555->20620 20625 2e1468f 20555->20625 20630 2e147ef 20555->20630 20634 2e1454c 20555->20634 20640 2e1490b 20555->20640 20648 2e14488 20555->20648 20653 2e145e5 20555->20653 20556->20540 20572 2e142e4 20571->20572 20573 2e142e6 20571->20573 20572->20573 20574 2e14620 2 API calls 20572->20574 20575 2e145e5 2 API calls 20572->20575 20576 2e14488 2 API calls 20572->20576 20577 2e1490b 4 API calls 20572->20577 20578 2e1454c 2 API calls 20572->20578 20579 2e147ef 2 API calls 20572->20579 20580 2e1468f 2 API calls 20572->20580 20581 2e144ee 2 API calls 20572->20581 20582 2e14453 2 API calls 20572->20582 20583 2e14e18 2 API calls 20572->20583 20584 2e149fa 2 API calls 20572->20584 20585 2e14d1c 2 API calls 20572->20585 20586 2e1451f 2 API calls 20572->20586 20587 2e1495f 2 API calls 20572->20587 20573->20540 20574->20573 20575->20573 20576->20573 20577->20573 20578->20573 20579->20573 20580->20573 20581->20573 20582->20573 20583->20573 20584->20573 20585->20573 20586->20573 20587->20573 20589 2e14a09 20588->20589 20590 2e14f91 20589->20590 20658 2e12e18 20589->20658 20662 2e12e13 20589->20662 20590->20556 20666 2e12fb0 20593->20666 20670 2e12fab 20593->20670 20594 2e14987 20594->20556 20598 2e14522 20597->20598 20674 2e13238 20598->20674 20678 2e1322f 20598->20678 20682 2e130a0 20602->20682 20686 2e13098 20602->20686 20603 2e14d3e 20607 2e14a09 20606->20607 20608 2e14f91 20607->20608 20609 2e12e13 Wow64SetThreadContext 20607->20609 20610 2e12e18 Wow64SetThreadContext 20607->20610 20608->20556 20609->20607 20610->20607 20613 2e12fb0 WriteProcessMemory 20611->20613 20614 2e12fab WriteProcessMemory 20611->20614 20612 2e14e46 20612->20556 20613->20612 20614->20612 20616 2e1448c 20615->20616 20618 2e13238 CreateProcessA 20616->20618 20619 2e1322f CreateProcessA 20616->20619 20617 2e14592 20617->20556 20618->20617 20619->20617 20621 2e14454 20620->20621 20623 2e13238 CreateProcessA 20621->20623 20624 2e1322f CreateProcessA 20621->20624 20622 2e14592 20622->20556 20623->20622 20624->20622 20626 2e146a7 20625->20626 20628 2e12fb0 WriteProcessMemory 20626->20628 20629 2e12fab WriteProcessMemory 20626->20629 20627 2e146c8 20627->20556 20628->20627 20629->20627 20632 2e12e13 Wow64SetThreadContext 20630->20632 20633 2e12e18 Wow64SetThreadContext 20630->20633 20631 2e14809 20632->20631 20633->20631 20636 2e14552 20634->20636 20635 2e14fe8 20636->20635 20638 2e13238 CreateProcessA 20636->20638 20639 2e1322f CreateProcessA 20636->20639 20637 2e14592 20637->20556 20638->20637 20639->20637 20691 2e150e1 20640->20691 20696 2e150f0 20640->20696 20641 2e146a7 20642 2e14cdf 20641->20642 20646 2e12fb0 WriteProcessMemory 20641->20646 20647 2e12fab WriteProcessMemory 20641->20647 20642->20556 20643 2e146c8 20643->20556 20646->20643 20647->20643 20649 2e1448e 20648->20649 20651 2e13238 CreateProcessA 20649->20651 20652 2e1322f CreateProcessA 20649->20652 20650 2e14592 20650->20556 20651->20650 20652->20650 20655 2e145f2 20653->20655 20654 2e14cb3 20709 2e12930 20655->20709 20713 2e12928 20655->20713 20659 2e12e5d Wow64SetThreadContext 20658->20659 20661 2e12ea5 20659->20661 20661->20589 20663 2e12e18 Wow64SetThreadContext 20662->20663 20665 2e12ea5 20663->20665 20665->20589 20667 2e12ff8 WriteProcessMemory 20666->20667 20669 2e1304f 20667->20669 20669->20594 20671 2e12fb0 WriteProcessMemory 20670->20671 20673 2e1304f 20671->20673 20673->20594 20675 2e132c1 CreateProcessA 20674->20675 20677 2e13483 20675->20677 20679 2e13238 CreateProcessA 20678->20679 20681 2e13483 20679->20681 20683 2e130eb ReadProcessMemory 20682->20683 20685 2e1312f 20683->20685 20685->20603 20687 2e1309c 20686->20687 20688 2e1307c 20687->20688 20689 2e130fe ReadProcessMemory 20687->20689 20688->20603 20690 2e1312f 20689->20690 20690->20603 20692 2e150f0 20691->20692 20701 2e12ef0 20692->20701 20705 2e12eeb 20692->20705 20693 2e15124 20693->20641 20697 2e15105 20696->20697 20699 2e12ef0 VirtualAllocEx 20697->20699 20700 2e12eeb VirtualAllocEx 20697->20700 20698 2e15124 20698->20641 20699->20698 20700->20698 20702 2e12f30 VirtualAllocEx 20701->20702 20704 2e12f6d 20702->20704 20704->20693 20706 2e12ef0 VirtualAllocEx 20705->20706 20708 2e12f6d 20706->20708 20708->20693 20710 2e12970 ResumeThread 20709->20710 20712 2e129a1 20710->20712 20712->20654 20714 2e1292c ResumeThread 20713->20714 20716 2e129a1 20714->20716 20716->20654 20513 2e154e9 PostMessageW 20514 2e15524 20513->20514 20717 14aad70 20720 14aae59 20717->20720 20718 14aad7f 20721 14aae79 20720->20721 20722 14aae9c 20720->20722 20721->20722 20723 14ab0a0 GetModuleHandleW 20721->20723 20722->20718 20724 14ab0cd 20723->20724 20724->20718

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 357 2e1322f-2e132cd 360 2e13306-2e13326 357->360 361 2e132cf-2e132d9 357->361 368 2e13328-2e13332 360->368 369 2e1335f-2e1338e 360->369 361->360 362 2e132db-2e132dd 361->362 363 2e13300-2e13303 362->363 364 2e132df-2e132e9 362->364 363->360 366 2e132eb 364->366 367 2e132ed-2e132fc 364->367 366->367 367->367 370 2e132fe 367->370 368->369 371 2e13334-2e13336 368->371 377 2e13390-2e1339a 369->377 378 2e133c7-2e13481 CreateProcessA 369->378 370->363 373 2e13359-2e1335c 371->373 374 2e13338-2e13342 371->374 373->369 375 2e13344 374->375 376 2e13346-2e13355 374->376 375->376 376->376 379 2e13357 376->379 377->378 380 2e1339c-2e1339e 377->380 389 2e13483-2e13489 378->389 390 2e1348a-2e13510 378->390 379->373 382 2e133c1-2e133c4 380->382 383 2e133a0-2e133aa 380->383 382->378 384 2e133ac 383->384 385 2e133ae-2e133bd 383->385 384->385 385->385 387 2e133bf 385->387 387->382 389->390 400 2e13520-2e13524 390->400 401 2e13512-2e13516 390->401 403 2e13534-2e13538 400->403 404 2e13526-2e1352a 400->404 401->400 402 2e13518 401->402 402->400 405 2e13548-2e1354c 403->405 406 2e1353a-2e1353e 403->406 404->403 407 2e1352c 404->407 409 2e1355e-2e13565 405->409 410 2e1354e-2e13554 405->410 406->405 408 2e13540 406->408 407->403 408->405 411 2e13567-2e13576 409->411 412 2e1357c 409->412 410->409 411->412 414 2e1357d 412->414 414->414
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02E1346E
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 77780aecec96a4fe2b51b4a4331b0f17a0bd99feac5dc90815047243f76cdd03
                                    • Instruction ID: 62b997a2490b14a415a1efd28ab44d24031ea4175e61ce857ecc56719636fe67
                                    • Opcode Fuzzy Hash: 77780aecec96a4fe2b51b4a4331b0f17a0bd99feac5dc90815047243f76cdd03
                                    • Instruction Fuzzy Hash: 2E918C71D00619CFDB24CFA9C841BEDBBB2FF48318F1491AAE819A7240DB759985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 415 2e13238-2e132cd 417 2e13306-2e13326 415->417 418 2e132cf-2e132d9 415->418 425 2e13328-2e13332 417->425 426 2e1335f-2e1338e 417->426 418->417 419 2e132db-2e132dd 418->419 420 2e13300-2e13303 419->420 421 2e132df-2e132e9 419->421 420->417 423 2e132eb 421->423 424 2e132ed-2e132fc 421->424 423->424 424->424 427 2e132fe 424->427 425->426 428 2e13334-2e13336 425->428 434 2e13390-2e1339a 426->434 435 2e133c7-2e13481 CreateProcessA 426->435 427->420 430 2e13359-2e1335c 428->430 431 2e13338-2e13342 428->431 430->426 432 2e13344 431->432 433 2e13346-2e13355 431->433 432->433 433->433 436 2e13357 433->436 434->435 437 2e1339c-2e1339e 434->437 446 2e13483-2e13489 435->446 447 2e1348a-2e13510 435->447 436->430 439 2e133c1-2e133c4 437->439 440 2e133a0-2e133aa 437->440 439->435 441 2e133ac 440->441 442 2e133ae-2e133bd 440->442 441->442 442->442 444 2e133bf 442->444 444->439 446->447 457 2e13520-2e13524 447->457 458 2e13512-2e13516 447->458 460 2e13534-2e13538 457->460 461 2e13526-2e1352a 457->461 458->457 459 2e13518 458->459 459->457 462 2e13548-2e1354c 460->462 463 2e1353a-2e1353e 460->463 461->460 464 2e1352c 461->464 466 2e1355e-2e13565 462->466 467 2e1354e-2e13554 462->467 463->462 465 2e13540 463->465 464->460 465->462 468 2e13567-2e13576 466->468 469 2e1357c 466->469 467->466 468->469 471 2e1357d 469->471 471->471
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02E1346E
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: fa4b4e5008d35594b785583246fc3cb38c657582cd9055efc5560edf85e4db16
                                    • Instruction ID: 86dc6887cc418925f6126d0476f5156062eb7de205adb3108888fd76a05ccfe1
                                    • Opcode Fuzzy Hash: fa4b4e5008d35594b785583246fc3cb38c657582cd9055efc5560edf85e4db16
                                    • Instruction Fuzzy Hash: 52917C71D00619CFDB24CFA9C841BEDBBB2FF48318F1491AAE819A7240DB759985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 472 14aae59-14aae77 473 14aae79-14aae86 call 14aa1c0 472->473 474 14aaea3-14aaea7 472->474 479 14aae88 473->479 480 14aae9c 473->480 476 14aaebb-14aaefc 474->476 477 14aaea9-14aaeb3 474->477 483 14aaf09-14aaf17 476->483 484 14aaefe-14aaf06 476->484 477->476 528 14aae8e call 14ab100 479->528 529 14aae8e call 14ab0f0 479->529 480->474 485 14aaf3b-14aaf3d 483->485 486 14aaf19-14aaf1e 483->486 484->483 491 14aaf40-14aaf47 485->491 488 14aaf29 486->488 489 14aaf20-14aaf27 call 14aa1cc 486->489 487 14aae94-14aae96 487->480 490 14aafd8-14ab098 487->490 493 14aaf2b-14aaf39 488->493 489->493 523 14ab09a-14ab09d 490->523 524 14ab0a0-14ab0cb GetModuleHandleW 490->524 494 14aaf49-14aaf51 491->494 495 14aaf54-14aaf5b 491->495 493->491 494->495 497 14aaf68-14aaf71 call 14aa1dc 495->497 498 14aaf5d-14aaf65 495->498 503 14aaf7e-14aaf83 497->503 504 14aaf73-14aaf7b 497->504 498->497 505 14aafa1-14aafae 503->505 506 14aaf85-14aaf8c 503->506 504->503 513 14aafb0-14aafce 505->513 514 14aafd1-14aafd7 505->514 506->505 508 14aaf8e-14aaf9e call 14aa1ec call 14aa1fc 506->508 508->505 513->514 523->524 525 14ab0cd-14ab0d3 524->525 526 14ab0d4-14ab0e8 524->526 525->526 528->487 529->487
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 014AB0BE
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144228245.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_14a0000_workbook.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: ceb4d17b9b0773c4c35f2553f1ada3c873193db90b946623088c11b2895ec7ba
                                    • Instruction ID: 591b2a5e0bf97a9c09d890a1f22ab1858ff4fda82a9ff40825b6e3b813814e94
                                    • Opcode Fuzzy Hash: ceb4d17b9b0773c4c35f2553f1ada3c873193db90b946623088c11b2895ec7ba
                                    • Instruction Fuzzy Hash: 088155B0A00B059FD728DF2AD45075BBBF5FF98204F10892EE48A87B60DB75E845CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 530 14a44e4-14a59d9 CreateActCtxA 533 14a59db-14a59e1 530->533 534 14a59e2-14a5a3c 530->534 533->534 541 14a5a4b-14a5a4f 534->541 542 14a5a3e-14a5a41 534->542 543 14a5a60 541->543 544 14a5a51-14a5a5d 541->544 542->541 545 14a5a61 543->545 544->543 545->545
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 014A59C9
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144228245.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_14a0000_workbook.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: f5bf5166b3a5caa84f464fc0262f0d02508bf741c687ab362b002a29db6fa475
                                    • Instruction ID: 6a9805ac23b99cd67f4882ffd4f7b31221146403259d5df85ae4715776b7651e
                                    • Opcode Fuzzy Hash: f5bf5166b3a5caa84f464fc0262f0d02508bf741c687ab362b002a29db6fa475
                                    • Instruction Fuzzy Hash: 6841F2B0D0071DCBDB24DFA9C984B9EBBB5BF49304F60806AD408AB261DB756946CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 547 14a590d-14a59d9 CreateActCtxA 549 14a59db-14a59e1 547->549 550 14a59e2-14a5a3c 547->550 549->550 557 14a5a4b-14a5a4f 550->557 558 14a5a3e-14a5a41 550->558 559 14a5a60 557->559 560 14a5a51-14a5a5d 557->560 558->557 561 14a5a61 559->561 560->559 561->561
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 014A59C9
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144228245.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_14a0000_workbook.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: c96a7e6b55db6e90095371aa0bf8e5bcef2fb10fef83a8d9745d08805ad0f35d
                                    • Instruction ID: 50e6f0cb48f7244c5fc5243df1d419441b862d161bf1d2d3792276632e6d7180
                                    • Opcode Fuzzy Hash: c96a7e6b55db6e90095371aa0bf8e5bcef2fb10fef83a8d9745d08805ad0f35d
                                    • Instruction Fuzzy Hash: E84102B0D00719CFDB24CFA9C985B9EBBF5BF49304F20806AD408AB261DB756946CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 563 2e13098-2e1309a 564 2e1309c 563->564 565 2e1309e-2e1312d ReadProcessMemory 563->565 564->565 566 2e1307c-2e13086 564->566 570 2e13136-2e13166 565->570 571 2e1312f-2e13135 565->571 571->570
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02E13120
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 1ea24305565e3c58423c5e2b0813f7e412dfc84fce3a025ebf2623eeeaa81ac4
                                    • Instruction ID: b29a02d18d13b44495070ee1af9ebd21a7530e220261da84c63c63ea6ac6b7f4
                                    • Opcode Fuzzy Hash: 1ea24305565e3c58423c5e2b0813f7e412dfc84fce3a025ebf2623eeeaa81ac4
                                    • Instruction Fuzzy Hash: 622119759003599FCB20DFAAD841AEEBBF5FF88320F10846AE559A7240C7789945CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 575 2e12fab-2e12ffe 578 2e13000-2e1300c 575->578 579 2e1300e-2e1304d WriteProcessMemory 575->579 578->579 581 2e13056-2e13086 579->581 582 2e1304f-2e13055 579->582 582->581
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02E13040
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 02c339703bf900b73fd05bcd8073fadc61cb3351bf86027cfdea386575347716
                                    • Instruction ID: b8b3e690489d610f77ff77530450569b0089152059bb705e305353f98fd6272e
                                    • Opcode Fuzzy Hash: 02c339703bf900b73fd05bcd8073fadc61cb3351bf86027cfdea386575347716
                                    • Instruction Fuzzy Hash: 272146B5D003499FCB10DFAAC881BEEBBF5FF48314F10842AE959A7240C7789940CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 586 2e12fb0-2e12ffe 588 2e13000-2e1300c 586->588 589 2e1300e-2e1304d WriteProcessMemory 586->589 588->589 591 2e13056-2e13086 589->591 592 2e1304f-2e13055 589->592 592->591
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02E13040
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 4d9af261194bbf808b248800f861c57284cd63805d4f4b5c7aeb32c8c8f41c72
                                    • Instruction ID: 59ca14ff50ea6cfa484b40ee29c79e79f39eaad34e486be4c4f518eb48d4a967
                                    • Opcode Fuzzy Hash: 4d9af261194bbf808b248800f861c57284cd63805d4f4b5c7aeb32c8c8f41c72
                                    • Instruction Fuzzy Hash: 742148B5D003499FCB10DFAAC885BEEBBF5FF48314F10842AE919A7240C7789944CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 596 2e12e13-2e12e63 599 2e12e73-2e12ea3 Wow64SetThreadContext 596->599 600 2e12e65-2e12e71 596->600 602 2e12ea5-2e12eab 599->602 603 2e12eac-2e12edc 599->603 600->599 602->603
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02E12E96
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: e8adc08630c8cdbe5bc164be79451dd77a0aaef66ee101b0f1a484c771d0fb5e
                                    • Instruction ID: 111d9c2415e9d4cc478f326cba6ec9602d6043e80ab8f0d01e30eebab5b221ab
                                    • Opcode Fuzzy Hash: e8adc08630c8cdbe5bc164be79451dd77a0aaef66ee101b0f1a484c771d0fb5e
                                    • Instruction Fuzzy Hash: 01213775D002098FDB10DFAAC8857EEBBF4EF88324F14842AD519A7241CB789985CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 607 14ab850-14ad7d4 DuplicateHandle 609 14ad7dd-14ad7fa 607->609 610 14ad7d6-14ad7dc 607->610 610->609
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,014AD706,?,?,?,?,?), ref: 014AD7C7
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144228245.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_14a0000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: a467781170fcb0c03c4dded2a7618c55e607469306c7c3fb3cc9a904064da2cc
                                    • Instruction ID: 71bdf6875480bc39e7b73cbee4d9a7c79674a8627131267a996b455d45f00a75
                                    • Opcode Fuzzy Hash: a467781170fcb0c03c4dded2a7618c55e607469306c7c3fb3cc9a904064da2cc
                                    • Instruction Fuzzy Hash: 2721E6B5D002489FDB10CF9AD584AEEBFF8FB48710F14841AE918A3310D378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 613 14ad738-14ad73a 614 14ad740-14ad7d4 DuplicateHandle 613->614 615 14ad7dd-14ad7fa 614->615 616 14ad7d6-14ad7dc 614->616 616->615
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,014AD706,?,?,?,?,?), ref: 014AD7C7
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144228245.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_14a0000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 6ccaf8e94a9977836dc1f55894f493cded2c366a5da8c22ce55b35cf2c4798c5
                                    • Instruction ID: 42a20a5f7b104643af449caff08a45d19d4f3bc5b31c60e005026fcd28e5d2d3
                                    • Opcode Fuzzy Hash: 6ccaf8e94a9977836dc1f55894f493cded2c366a5da8c22ce55b35cf2c4798c5
                                    • Instruction Fuzzy Hash: 1E21E4B5D002489FDB10CFAAD984ADEBFF9FB48310F14841AE958A7310D378A954CFA5
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02E13120
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 0817df710006ea20e30ec1852a31d1c45b9634214d6eaee2eae9e11098c65d31
                                    • Instruction ID: be3588a85c0e5825a2f7cb8200fbe2e1cb15faf97c81d099c215bcd48c8569ba
                                    • Opcode Fuzzy Hash: 0817df710006ea20e30ec1852a31d1c45b9634214d6eaee2eae9e11098c65d31
                                    • Instruction Fuzzy Hash: 7B2138B1D003499FCB10DFAAC881AEEFBF5FF48320F10842AE519A7240C7389941CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 619 2e12e18-2e12e63 621 2e12e73-2e12ea3 Wow64SetThreadContext 619->621 622 2e12e65-2e12e71 619->622 624 2e12ea5-2e12eab 621->624 625 2e12eac-2e12edc 621->625 622->621 624->625
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02E12E96
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 0db42f020b1ec4ec5333a11781d09f390e35002d23f5e4051756da5b5c95fa5e
                                    • Instruction ID: e151b25c9c9a9ce49f203c3ef7aefce3bb84da2b49830bd9da341fd80c05b7a4
                                    • Opcode Fuzzy Hash: 0db42f020b1ec4ec5333a11781d09f390e35002d23f5e4051756da5b5c95fa5e
                                    • Instruction Fuzzy Hash: CA211871D002098FDB10DFAAC9857EEBBF4EF48314F14842AD559A7240CB789945CFA5
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02E12F5E
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 04f6e1cf88aef119a5e563aca570c2fe6b8193cce2bf5af854477d502d7d0448
                                    • Instruction ID: b6c93750a8c28a3dba5c7439e8a75de2b33dc3622535e2e2efd0e5f632929b66
                                    • Opcode Fuzzy Hash: 04f6e1cf88aef119a5e563aca570c2fe6b8193cce2bf5af854477d502d7d0448
                                    • Instruction Fuzzy Hash: DC1159759002499FCB10DFAAD845AEEBFF5EF88314F248419E519A7250CB39A540CBA1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 718a797a3981e2300b57f50f0631a0c5221f56d0e2e45d0f8947c2927b51aa0f
                                    • Instruction ID: 1587d7dc8fff060ed69d754de9e721894214524ef8c716a53da4110573aaf1e9
                                    • Opcode Fuzzy Hash: 718a797a3981e2300b57f50f0631a0c5221f56d0e2e45d0f8947c2927b51aa0f
                                    • Instruction Fuzzy Hash: 80117CB5D002488FCB20DFAEC8457EEFBF4EF88314F208429D519A7200C738A441CBA5
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02E12F5E
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: a027077014610c10f9a15432b6f81057b5c0fd571cde7b737933a1ab99572d7d
                                    • Instruction ID: d3aab44f8e6792de8b4ee4ad0b5975ef13454e0ab745f4e60867344db480beb7
                                    • Opcode Fuzzy Hash: a027077014610c10f9a15432b6f81057b5c0fd571cde7b737933a1ab99572d7d
                                    • Instruction Fuzzy Hash: 801137759002499FCB10DFAAC845AEFBFF5FF88314F208419E519A7250C779A540CFA1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 18463efbedbdb469595337d64eb613fe01e005cfd9b7f62e1de6ecbc4abb6cac
                                    • Instruction ID: a18d6195b117b9600bb5320bf7d317b68866658a2203e788b49b46d0098947f3
                                    • Opcode Fuzzy Hash: 18463efbedbdb469595337d64eb613fe01e005cfd9b7f62e1de6ecbc4abb6cac
                                    • Instruction Fuzzy Hash: DF1128B19002498FCB10DFAAC8457EEFBF5EF88324F208419D519A7240CB79A544CBA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 014AB0BE
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144228245.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_14a0000_workbook.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: ba1ac7f48da2f3f0edcdc9f01cd5c230bca9285e013d5b14eef089037f2304c0
                                    • Instruction ID: 6b0362ab8a1ba47dec95d72a62a63a7a92d2fd5a073511e809839980fa14e0c6
                                    • Opcode Fuzzy Hash: ba1ac7f48da2f3f0edcdc9f01cd5c230bca9285e013d5b14eef089037f2304c0
                                    • Instruction Fuzzy Hash: EC1110B5C002498FDB10CF9AC444BDEFBF4EF88310F11841AD529A7210D379A545CFA1
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 02E15515
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 01d0ce1dd3f6f026846e6ac25e10d1595bbcfddd1a2120e39c001d308ae2539b
                                    • Instruction ID: 4e3ea525cd0dce4986097e43eacf5ab2f7b34be8742cc00a4697f598c4752a83
                                    • Opcode Fuzzy Hash: 01d0ce1dd3f6f026846e6ac25e10d1595bbcfddd1a2120e39c001d308ae2539b
                                    • Instruction Fuzzy Hash: FBF0E7B5900309DFDB10DF89D484BDEBBF4FB88324F10845AE558A7210C379A584CFA1
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 02E167A8
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 2eacc2d6713f285cb6615e8932ce7cfb225ae58d6bcceb3c4f2508d7766ff0b1
                                    • Instruction ID: b95a8c32efb581891817c74346e312d20d01c7f483646d39a4076bfb00d30092
                                    • Opcode Fuzzy Hash: 2eacc2d6713f285cb6615e8932ce7cfb225ae58d6bcceb3c4f2508d7766ff0b1
                                    • Instruction Fuzzy Hash: 481166B58002498FCB10DF99C645BEEBBF4EF48324F20846AD958A7340D339A944CFA1
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 02E167A8
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2144709219.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_2e10000_workbook.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: dc3b3755cd8514031aa9387044f39e425bef0fa9423e0cfd7a9706c6c79b967b
                                    • Instruction ID: 171742dd40f1f367bbaa33691701405df7473228b5ea24c5db2ce62777cf4b6c
                                    • Opcode Fuzzy Hash: dc3b3755cd8514031aa9387044f39e425bef0fa9423e0cfd7a9706c6c79b967b
                                    • Instruction Fuzzy Hash: EC1115B58007498FCB10DF9AC545BDEBBF8EF48324F14846AD958A7340D739A544CFA5
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142400354.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11cd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 395038858c10a8fefbed137d762fa2ccbe20aabfff07b4343fe2dc02867ca636
                                    • Instruction ID: f4398b35a2bf7ef0ed6471e2ffe5c74ac41134bc7d4efb9f256a728c30725d4f
                                    • Opcode Fuzzy Hash: 395038858c10a8fefbed137d762fa2ccbe20aabfff07b4343fe2dc02867ca636
                                    • Instruction Fuzzy Hash: 9D2102B1100204DFDF09DF58E9C0B66BF65FBA8714F20C17DDA090A656C33AE406C6E2
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142400354.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11cd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c682381b428f05191c6ed94f6878215238f7d7c7b3306b562d8e5a26714ff3d0
                                    • Instruction ID: 3d8e68ddfd10205cbb7d5612da47636204fa614bc96549997c095d1a3c7e1749
                                    • Opcode Fuzzy Hash: c682381b428f05191c6ed94f6878215238f7d7c7b3306b562d8e5a26714ff3d0
                                    • Instruction Fuzzy Hash: 4721E071500240DFDF09DF98E980B26BF65FBA8718F20857DE9090A256C33AD416CAE2
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142460969.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11dd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5460ebf116109e13c0cbc5b0d310a434c50d8345fde043156d68a2e4da636501
                                    • Instruction ID: 80fb3d64eec20b38956f3eaa105501d71da903b974192f08b685cf429ae0159d
                                    • Opcode Fuzzy Hash: 5460ebf116109e13c0cbc5b0d310a434c50d8345fde043156d68a2e4da636501
                                    • Instruction Fuzzy Hash: 4921F271604204DFDF19DF68E984B26BF65FBC8354F24C56DD90A4B296C33AD407CAA2
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142460969.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11dd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 744916b34125f87588b6035d00ae888af3c7285f2f7b93544f1a86abd0bee9ee
                                    • Instruction ID: b59d1efbdcc4e487caf784dc92376b9ebd627433f3d6bc5f160b75d6bdd3c29b
                                    • Opcode Fuzzy Hash: 744916b34125f87588b6035d00ae888af3c7285f2f7b93544f1a86abd0bee9ee
                                    • Instruction Fuzzy Hash: 1121D771544204EFDF09DFA8E9C0F26BF65FB84324F24C56DE9494B296C33AD446CA62
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142460969.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11dd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a3564bd54dc7e41f34523aef8253bd213474e163ab3c7660a87fb06100f82ae1
                                    • Instruction ID: a93b39dcfc62cbdd1f13b35ddec322aab985b5e8f387b31ebf3814410005a977
                                    • Opcode Fuzzy Hash: a3564bd54dc7e41f34523aef8253bd213474e163ab3c7660a87fb06100f82ae1
                                    • Instruction Fuzzy Hash: 4D21A1755093808FDB17CF24D994B15BF71EB86214F28C5EAD8498B6A7C33AD40ACB62
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142400354.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11cd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 8e31b088c14b66bb675da1a29ea5540dd088482c7b5b5f0a9c7894d648f93670
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: BC11CD72404280DFDF06CF44D9C4B56BF61FB94224F24C6ADDA090A656C33AE45ACBA2
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142400354.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11cd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 5f7358f9821de03d1d006202401b064cb9cae840db22e487c15a223ef9ce6c6a
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: CE11CD76404280CFCF06CF54E9C4B16BF71FBA8614F24C6A9D9490B256C336D45ACBA2
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142460969.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11dd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction ID: f8668bc3675b7cd7abe3d5776c26f50fa6a7ab07a422a886a53b6b9682c51410
                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction Fuzzy Hash: 9E11BB75504280DFDF06CF54D5C4B15BFB1FB84224F24C6A9D8494B696C33AD40ACB62
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142400354.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11cd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0122e34f357ef7329154d79e391c2432e2ec181663b5a0320281a0cf298ec3a6
                                    • Instruction ID: 625b9b76c72edb7f243663f73617f44126470b003c361dec26ef690b19102f24
                                    • Opcode Fuzzy Hash: 0122e34f357ef7329154d79e391c2432e2ec181663b5a0320281a0cf298ec3a6
                                    • Instruction Fuzzy Hash: 3B01203100478099EB145E99DD84B67FF9CDF55728F18C57EED090A246D3799401C6F2
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.2142400354.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_11cd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 75bdcd98b3db1ea2b04594ff305e5ff0440d625fe123c3a54f24d8cd458c2217
                                    • Instruction ID: fe315d444351414e6497fe080826d4a8a53dbbbde417697ef1dec76582466a16
                                    • Opcode Fuzzy Hash: 75bdcd98b3db1ea2b04594ff305e5ff0440d625fe123c3a54f24d8cd458c2217
                                    • Instruction Fuzzy Hash: F2F0C8710043849AEB148E59DC84B62FF98EF55634F18C45AED484A286C3799840CBB1

                                    Execution Graph

                                    Execution Coverage:10.7%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:86
                                    Total number of Limit Nodes:10
                                    execution_graph 23622 308bf08 23625 308bff0 23622->23625 23623 308bf17 23626 308c000 23625->23626 23627 308c034 23626->23627 23628 308c238 GetModuleHandleW 23626->23628 23627->23623 23629 308c265 23628->23629 23629->23623 23630 3084668 23631 3084669 23630->23631 23636 3086de0 23631->23636 23634 3084704 23637 3086e05 23636->23637 23645 3086edf 23637->23645 23649 3086ef0 23637->23649 23638 30846e9 23641 308421c 23638->23641 23642 3084227 23641->23642 23657 3088560 23642->23657 23644 3088806 23644->23634 23647 3086ee4 23645->23647 23646 3086ff4 23646->23646 23647->23646 23653 3086414 23647->23653 23651 3086ef5 23649->23651 23650 3086ff4 23650->23650 23651->23650 23652 3086414 CreateActCtxA 23651->23652 23652->23650 23654 3087370 CreateActCtxA 23653->23654 23656 3087433 23654->23656 23658 308856b 23657->23658 23661 3088580 23658->23661 23660 30888dd 23660->23644 23662 308858b 23661->23662 23665 30885b0 23662->23665 23664 30889ba 23664->23660 23666 30885bb 23665->23666 23669 30885e0 23666->23669 23668 3088aad 23668->23664 23671 30885eb 23669->23671 23670 3089ed1 23670->23668 23671->23670 23674 308df60 23671->23674 23679 308df70 23671->23679 23675 308df64 23674->23675 23676 308dfb5 23675->23676 23684 308e110 23675->23684 23688 308e120 23675->23688 23676->23670 23680 308df91 23679->23680 23681 308dfb5 23680->23681 23682 308e110 3 API calls 23680->23682 23683 308e120 3 API calls 23680->23683 23681->23670 23682->23681 23683->23681 23685 308e114 23684->23685 23686 308e166 23685->23686 23692 308c464 23685->23692 23686->23676 23689 308e121 23688->23689 23690 308e166 23689->23690 23691 308c464 3 API calls 23689->23691 23690->23676 23691->23690 23693 308c469 23692->23693 23695 308e1ff 23693->23695 23696 308c498 23693->23696 23697 308c4a3 23696->23697 23698 30885e0 3 API calls 23697->23698 23699 308e247 23698->23699 23700 308e256 23699->23700 23703 308e2c0 23699->23703 23709 308e2b0 23699->23709 23700->23693 23704 308e2ee 23703->23704 23705 308c530 GetFocus 23704->23705 23706 308e317 23704->23706 23708 308e3bf 23704->23708 23705->23706 23707 308e3ba KiUserCallbackDispatcher 23706->23707 23706->23708 23707->23708 23710 308e2b4 23709->23710 23711 308c530 GetFocus 23710->23711 23712 308e317 23710->23712 23714 308e3bf 23710->23714 23711->23712 23713 308e3ba KiUserCallbackDispatcher 23712->23713 23712->23714 23713->23714 23715 3086540 23716 3086545 GetCurrentProcess 23715->23716 23718 30865d8 GetCurrentThread 23716->23718 23719 30865d1 23716->23719 23720 308660e 23718->23720 23721 3086615 GetCurrentProcess 23718->23721 23719->23718 23720->23721 23722 308664b 23721->23722 23726 308670f 23722->23726 23723 3086673 GetCurrentThreadId 23724 30866a4 23723->23724 23727 3086788 DuplicateHandle 23726->23727 23730 3086713 23726->23730 23729 308681e 23727->23729 23729->23723 23730->23723

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 944 828b6e0-828b6fc 945 828b702-828b70f 944->945 946 828b786-828b7c0 944->946 949 828b711-828b71c 945->949 950 828b726-828b732 945->950 958 828b76a-828b783 946->958 963 828b7c2-828b7df 946->963 952 828b721-828b724 949->952 954 828b75a 950->954 955 828b734-828b758 950->955 956 828b763-828b769 952->956 954->956 955->954 955->956 956->958 964 828b8a0-828b901 963->964 965 828b7e5-828b7eb 963->965 984 828b92b-828b979 964->984 985 828b903-828b92a 964->985 966 828b7ed-828b7f0 965->966 967 828b815-828b826 965->967 968 828b86b-828b899 966->968 969 828b7f2-828b814 966->969 973 828b828 967->973 974 828b82e-828b832 967->974 968->964 976 828b83a-828b86a 973->976 977 828b82a-828b82c 973->977 974->976 977->974 977->976 990 828b989-828b98d 984->990 991 828b97b-828b984 call 828b588 984->991 993 828b98f-828b99e 990->993 994 828b9a3-828b9b4 990->994 991->990 997 828bd38-828bd3f 993->997 995 828b9ba-828b9cf 994->995 996 828beb2-828bec0 994->996 998 828b9db-828b9ee 995->998 999 828b9d1-828b9d6 995->999 1004 828be6d-828be86 996->1004 1005 828bec2-828bed2 996->1005 1000 828bd40-828bd5e 998->1000 1001 828b9f4-828ba00 998->1001 999->997 1014 828bd65-828bd83 1000->1014 1001->996 1003 828ba06-828ba3d 1001->1003 1008 828ba49-828ba4d 1003->1008 1009 828ba3f-828ba44 1003->1009 1037 828be8d-828beab 1004->1037 1006 828beeb-828bf36 1005->1006 1007 828bed4-828bed8 1005->1007 1046 828bf38-828bf44 1006->1046 1047 828bf45-828bf4a 1006->1047 1011 828bee8-828beea 1007->1011 1012 828beda-828bee5 1007->1012 1013 828ba53-828ba5f 1008->1013 1008->1014 1009->997 1012->1011 1013->996 1017 828ba65-828ba9c 1013->1017 1026 828bd8a-828bda8 1014->1026 1022 828baa8-828baac 1017->1022 1023 828ba9e-828baa3 1017->1023 1022->1026 1027 828bab2-828babe 1022->1027 1023->997 1035 828bdaf-828bdcd 1026->1035 1027->996 1028 828bac4-828bafb 1027->1028 1031 828bafd-828bb02 1028->1031 1032 828bb07-828bb0b 1028->1032 1031->997 1032->1035 1036 828bb11-828bb1d 1032->1036 1052 828bdd4-828bdf2 1035->1052 1036->996 1039 828bb23-828bb5a 1036->1039 1037->996 1043 828bb5c-828bb61 1039->1043 1044 828bb66-828bb6a 1039->1044 1043->997 1051 828bb70-828bb7c 1044->1051 1044->1052 1049 828bf88-828bf8c 1047->1049 1050 828bf4c-828bf4f 1047->1050 1054 828bf7d-828bf86 1050->1054 1051->996 1056 828bb82-828bbb9 1051->1056 1064 828bdf9-828be17 1052->1064 1054->1049 1060 828bf51-828bf65 1054->1060 1058 828bbbb-828bbc0 1056->1058 1059 828bbc5-828bbc9 1056->1059 1058->997 1059->1064 1065 828bbcf-828bbdb 1059->1065 1070 828bf7c 1060->1070 1071 828bf67-828bf7b call 8283820 1060->1071 1076 828be1e-828be3c 1064->1076 1065->996 1067 828bbe1-828bc18 1065->1067 1072 828bc1a-828bc1f 1067->1072 1073 828bc24-828bc28 1067->1073 1070->1054 1072->997 1073->1076 1077 828bc2e-828bc3a 1073->1077 1085 828be43-828be61 1076->1085 1077->996 1078 828bc40-828bc77 1077->1078 1081 828bc79-828bc7e 1078->1081 1082 828bc83-828bc87 1078->1082 1081->997 1084 828bc8d-828bc99 1082->1084 1082->1085 1084->996 1087 828bc9f-828bcd6 1084->1087 1093 828be68 1085->1093 1089 828bcd8-828bcdd 1087->1089 1090 828bcdf-828bce3 1087->1090 1089->997 1090->1093 1094 828bce9-828bcf2 1090->1094 1093->1004 1094->996 1096 828bcf8-828bd2d 1094->1096 1096->1037 1097 828bd33 1096->1097 1097->997
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (aq$(aq
                                    • API String ID: 0-3916115647
                                    • Opcode ID: 77c33a5e5cd830050711f5ea38468a2f0c3719868fe5f8c0cfb7622595fe839e
                                    • Instruction ID: 0518b9b700882c057237c3c41e927d88d6ad209a552088e040f1574cb40567e2
                                    • Opcode Fuzzy Hash: 77c33a5e5cd830050711f5ea38468a2f0c3719868fe5f8c0cfb7622595fe839e
                                    • Instruction Fuzzy Hash: 22429A74B01216CFCB19DF69C49466EFBF2BF88311F14896DD95A9B391CB30A806CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 540 8289700-828970e 541 82899de-8289a03 540->541 542 8289714-828971a 540->542 550 8289a0a-8289a12 541->550 543 8289808-828980b 542->543 544 8289720-8289722 542->544 548 828980d-8289810 543->548 549 8289836-8289842 543->549 545 8289728-828972b 544->545 546 82898ad-82898b1 544->546 545->550 551 8289731-828973d 545->551 553 82898c9-82898d5 546->553 554 82898b3-82898c4 call 82891e0 546->554 548->550 552 8289816-8289831 call 82891e0 548->552 555 8289874-828988f call 82896c8 549->555 556 8289844-8289848 549->556 571 8289a19-8289a36 550->571 559 828973f-8289743 551->559 560 8289763-828976e 551->560 580 82899d8-82899dd 552->580 557 8289907-828991a 553->557 558 82898d7-82898db 553->558 554->580 555->580 564 828984a-828985e 556->564 565 8289860-828986b 556->565 557->571 572 8289920-8289934 557->572 566 82898dd-82898f1 558->566 567 82898f3-82898fe 558->567 568 8289749-828975d 559->568 569 8289894-82898a8 559->569 560->571 573 8289774-8289783 560->573 564->555 564->565 565->555 566->557 566->567 567->557 568->560 568->569 569->560 590 8289a48-8289a9c 571->590 591 8289a38-8289a47 571->591 572->571 581 828993a-828994e 572->581 573->571 582 8289789-8289798 573->582 581->571 587 8289954-8289968 581->587 582->571 588 828979e-82897ad 582->588 587->571 592 828996e-8289982 587->592 588->571 593 82897b3-82897bc 588->593 612 8289b7a-8289b9f 590->612 613 8289aa2-8289aa4 590->613 592->571 594 8289988-8289991 592->594 593->571 595 82897c2-82897cc 593->595 594->571 598 8289997-82899a1 594->598 595->571 599 82897d2-82897dc 595->599 598->571 600 82899a3-82899ad 598->600 599->571 601 82897e2-82897ec 599->601 600->571 603 82899af-82899b9 600->603 601->571 604 82897f2-8289803 call 82896c8 601->604 603->571 605 82899bb-82899c5 603->605 604->580 605->571 607 82899c7-82899ce 605->607 607->580 610 82899d3 call 82896c8 607->610 610->580 615 8289ba6-8289bcb 612->615 614 8289aaa-8289ab1 613->614 613->615 616 8289b6b-8289b73 614->616 617 8289ab7 614->617 623 8289bd2-8289bf6 615->623 616->612 617->616 619 8289b0b-8289b1d call 82891e0 617->619 620 8289abe-8289ac1 617->620 621 8289b00-8289b03 617->621 637 8289b1f-8289b24 619->637 638 8289b27-8289b2b 619->638 620->623 624 8289ac7-8289ad2 620->624 626 8289b09 621->626 627 8289bfd-8289c32 621->627 623->627 630 8289ade-8289afd call 82896c8 624->630 631 8289ad4-8289ad6 624->631 626->624 631->630 638->624 641 8289b2d-8289b33 638->641 641->624 642 8289b35-8289b68 641->642
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (aq$(aq$(aq$(aq$(aq$Haq$Haq
                                    • API String ID: 0-2223377583
                                    • Opcode ID: 28e79237ce9e3497d9f333c689183395fcc512a78c6b6a0935695c06bbc84a2e
                                    • Instruction ID: d4fadef523359b4c77a931cd1ff4ab0595cc18a3b10788e5160c98fc21f6df1e
                                    • Opcode Fuzzy Hash: 28e79237ce9e3497d9f333c689183395fcc512a78c6b6a0935695c06bbc84a2e
                                    • Instruction Fuzzy Hash: 54E1D030612606CFCB15EF68D48463ABFE2FF85216B548A5DD846DB786CB30F882CB51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 652 3086530-3086531 653 30865a8-30865cf GetCurrentProcess 652->653 654 3086533-308653e 652->654 657 30865d8-308660c GetCurrentThread 653->657 658 30865d1-30865d7 653->658 655 3086540-3086544 654->655 656 3086545-30865a6 654->656 655->656 656->653 659 308660e-3086614 657->659 660 3086615-3086649 GetCurrentProcess 657->660 658->657 659->660 661 308664b-3086651 660->661 662 3086652-308666d call 308670f 660->662 661->662 668 3086673-30866a2 GetCurrentThreadId 662->668 669 30866ab-308670d 668->669 670 30866a4-30866aa 668->670 670->669
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 030865BE
                                    • GetCurrentThread.KERNEL32 ref: 030865FB
                                    • GetCurrentProcess.KERNEL32 ref: 03086638
                                    • GetCurrentThreadId.KERNEL32 ref: 03086691
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 4daf9f4fb66504eb7ff9f2fd5590449be34458090e799358a1e45926f9ccdead
                                    • Instruction ID: 21e81fe6c12811b2179efcd9b520799b476f1aea0074b743a62df2adafc79a98
                                    • Opcode Fuzzy Hash: 4daf9f4fb66504eb7ff9f2fd5590449be34458090e799358a1e45926f9ccdead
                                    • Instruction Fuzzy Hash: F45164B0901249CFDB04DFAAD548BAEBFF1EF48304F248069E509A7360DB39A944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 678 3086540-30865cf GetCurrentProcess 684 30865d8-308660c GetCurrentThread 678->684 685 30865d1-30865d7 678->685 686 308660e-3086614 684->686 687 3086615-3086649 GetCurrentProcess 684->687 685->684 686->687 688 308664b-3086651 687->688 689 3086652-308666d call 308670f 687->689 688->689 693 3086673-30866a2 GetCurrentThreadId 689->693 694 30866ab-308670d 693->694 695 30866a4-30866aa 693->695 695->694
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 030865BE
                                    • GetCurrentThread.KERNEL32 ref: 030865FB
                                    • GetCurrentProcess.KERNEL32 ref: 03086638
                                    • GetCurrentThreadId.KERNEL32 ref: 03086691
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: a9c0a5d0b2a3865868d406489735464a02a0848142cd6806ca6a72fe102a33a5
                                    • Instruction ID: 02936657e6a87dc20c510d211a01c022159050993b81355aa12e7761e916cf03
                                    • Opcode Fuzzy Hash: a9c0a5d0b2a3865868d406489735464a02a0848142cd6806ca6a72fe102a33a5
                                    • Instruction Fuzzy Hash: 245153B0901249CFDB04DFAAD548BAEBFF5EF48304F248429E509A7360CB39A944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 702 8288f40-8288f52 703 8288f58-8288f5c 702->703 704 8289045-828906a 702->704 705 8289071-8289145 703->705 706 8288f62-8288f66 703->706 704->705 708 828914c-8289170 705->708 706->708 709 8288f6c-8288f71 706->709 726 8289177-82891f6 708->726 710 8288f9f-8288fa2 709->710 711 8288f73-8288f9c 709->711 715 8288fce-828903e 710->715 716 8288fa4-8288fa8 710->716 715->704 719 8288fba-8288fcb 716->719 720 8288faa-8288fae 716->720 720->719 724 8288fb0-8288fb4 720->724 724->719 724->726 750 8289228-828922a 726->750 751 82891f8-82891fc 726->751 755 828922d-8289246 750->755 753 82891fe-8289212 751->753 754 8289214-828921f 751->754 753->750 753->754 754->750 756 8289248-8289258 755->756 757 828928f-82892c2 755->757 756->755 760 828925a-8289264 756->760 763 8289308-828932d 757->763 764 82892c4-82892c8 757->764 760->757 762 8289266-828928e 760->762 767 8289334-8289360 763->767 766 82892ca-82892e1 764->766 764->767 774 82892e7-82892f3 766->774 777 82892f4-8289305 767->777 782 8289362-8289380 767->782 774->777 783 82894e0-8289505 782->783 784 8289386-8289390 782->784 787 828950c-8289530 783->787 785 828939a-828939e 784->785 786 8289392 784->786 785->787 788 82893a4-82893ac 785->788 786->785 801 8289537-828954a 787->801 790 82894d1-82894d9 788->790 791 82893b2 788->791 790->783 791->790 793 82893b9-82893d8 791->793 794 82893db-82893f0 791->794 795 8289455-828945b 791->795 797 8289421-8289452 794->797 798 82893f2-82893f6 794->798 800 8289461-828946f 795->800 795->801 803 82893f8-828940e 798->803 804 8289410-8289419 798->804 806 82894a0-82894ce 800->806 807 8289471-8289475 800->807 803->797 803->804 804->797 808 828948f-8289498 807->808 809 8289477-828948d 807->809 808->806 809->806 809->808
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (aq$(aq$(aq
                                    • API String ID: 0-2593664646
                                    • Opcode ID: 298bfacf7a30017dd4fbe0b23f927f073ff1f9cda4cb03245e713688f125bdfb
                                    • Instruction ID: 75b895ac67065c005dbae25e49773ff176c17e522cf46a7c378e215d02f21e56
                                    • Opcode Fuzzy Hash: 298bfacf7a30017dd4fbe0b23f927f073ff1f9cda4cb03245e713688f125bdfb
                                    • Instruction Fuzzy Hash: 3A02CB34B016068FCB14DF68C884A6FBBF2FF89310B10856DD94ADB795DA34E942CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 816 82828a0-82828b0 817 82829c9-82829ee 816->817 818 82828b6-82828ba 816->818 820 82829f5-8282a1a 817->820 819 82828c0-82828c9 818->819 818->820 821 82828cf-82828f6 819->821 822 8282a21-8282a57 819->822 820->822 832 82828fc-82828fe 821->832 833 82829be-82829c8 821->833 839 8282a5e-8282abd 822->839 835 828291f-8282921 832->835 836 8282900-8282903 832->836 840 8282924-8282928 835->840 838 8282909-8282913 836->838 836->839 838->839 841 8282919-828291d 838->841 856 8282abf-8282ac4 839->856 857 8282ae1-8282af8 839->857 843 8282989-8282995 840->843 844 828292a-8282939 840->844 841->835 841->840 843->839 845 828299b-82829b8 843->845 844->839 850 828293f-8282986 844->850 845->832 845->833 850->843 915 8282ac7 call 8282d78 856->915 916 8282ac7 call 8282d88 856->916 866 8282be8-8282bf8 857->866 867 8282afe-8282be3 call 82819d0 call 8280dc8 857->867 859 8282acd-8282ad3 917 8282ad6 call 8282e28 859->917 918 8282ad6 call 8282e38 859->918 919 8282ad6 call 8282fc8 859->919 920 8282ad6 call 82830a8 859->920 921 8282ad6 call 8283098 859->921 862 8282adc 864 8282d0a-8282d15 862->864 873 8282d44-8282d65 864->873 874 8282d17-8282d27 864->874 871 8282bfe-8282cd7 call 82819d0 866->871 872 8282ce5-8282d01 866->872 867->866 912 8282cd9 871->912 913 8282ce2 871->913 872->864 882 8282d29-8282d2f 874->882 883 8282d37-8282d3d 874->883 882->883 883->873 912->913 913->872 915->859 916->859 917->862 918->862 919->862 920->862 921->862
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (aq$(aq$Haq
                                    • API String ID: 0-2456560092
                                    • Opcode ID: 507e9b4e9da2ec751e80665bd61f2e1f18a66387008f0b51ff4b69d1a677b004
                                    • Instruction ID: b97cef8d65329bdfd0dbd0daf060a0b62292ec608b4243e06c2beb474b8d215d
                                    • Opcode Fuzzy Hash: 507e9b4e9da2ec751e80665bd61f2e1f18a66387008f0b51ff4b69d1a677b004
                                    • Instruction Fuzzy Hash: EBE15434A01209DFCB44EF64D9949AEBBB6FF88310F118569E805AB364DF34ED46CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1099 8287920-8287980 1104 8287988-82879c1 1099->1104 1108 82879ca-8287a0c 1104->1108 1109 82879c3-82879c8 1104->1109 1110 8287a0f-8287a19 1108->1110 1109->1110 1112 8287a1f-8287b0d call 8280a20 * 2 call 8280dc8 * 2 call 8280a20 call 8280dc8 1110->1112 1113 8287b15-8287bfa call 8280788 * 2 1110->1113 1112->1113 1159 8287bfc-8287c31 1113->1159 1160 8287c3e-8287ca9 call 8280788 1113->1160 1159->1160 1172 8287c33-8287c36 1159->1172 1175 8287cab 1160->1175 1176 8287cb4 1160->1176 1172->1160 1175->1176 1177 8287cb5 1176->1177 1177->1177
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q
                                    • API String ID: 0-3120983240
                                    • Opcode ID: f94c489dbc761fa8490e113ecc1b6413e8f818f6e2d0dba173d7d2a491138b27
                                    • Instruction ID: 1bc50fc1121896c1f0a5b6d4423c42ac93ed6f0ab9a4d19a0ca7ca6b70b36736
                                    • Opcode Fuzzy Hash: f94c489dbc761fa8490e113ecc1b6413e8f818f6e2d0dba173d7d2a491138b27
                                    • Instruction Fuzzy Hash: 83C1B674B10218DFDB44EFA8C994AADB7B6FF88300F104569E506AB3A5DB71AC42CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1178 8287917-8287980 1183 8287988-82879c1 1178->1183 1187 82879ca-8287a0c 1183->1187 1188 82879c3-82879c8 1183->1188 1189 8287a0f-8287a19 1187->1189 1188->1189 1191 8287a1f-8287b0d call 8280a20 * 2 call 8280dc8 * 2 call 8280a20 call 8280dc8 1189->1191 1192 8287b15-8287bfa call 8280788 * 2 1189->1192 1191->1192 1238 8287bfc-8287c31 1192->1238 1239 8287c3e-8287ca9 call 8280788 1192->1239 1238->1239 1251 8287c33-8287c36 1238->1251 1254 8287cab 1239->1254 1255 8287cb4 1239->1255 1251->1239 1254->1255 1256 8287cb5 1255->1256 1256->1256
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q
                                    • API String ID: 0-3120983240
                                    • Opcode ID: 1d283b071e0c9bd1b6a5d6100b3e6f24e63194e3d6609c3556bbd5e8fc605b2f
                                    • Instruction ID: cb0a35ff21e44c7b5db96ec8b857ac4b25b28a7143b6eb73cffb26711fb4bd27
                                    • Opcode Fuzzy Hash: 1d283b071e0c9bd1b6a5d6100b3e6f24e63194e3d6609c3556bbd5e8fc605b2f
                                    • Instruction Fuzzy Hash: 50C1D874B10218DFCB44EFA8C994AADB7B6FF88301F104569E506AB3A5DB74AC46CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1257 8280e88-8280e93 1258 8280ea1 1257->1258 1259 8280e95-8280e9f 1257->1259 1260 8280ea6-8280ea8 1258->1260 1259->1260 1261 8280eaa-8280ebd call 8280dc8 1260->1261 1262 8280ed6-8280f58 1260->1262 1268 8280ec5-8280ed3 1261->1268 1275 8280f5a-8280f74 1262->1275 1276 8280fb5-8280ff5 1262->1276 1281 8280faf-8280fb3 1275->1281 1282 8280f76-8280f84 1275->1282 1287 8280ffc-8281044 1276->1287 1281->1275 1281->1276 1282->1281 1285 8280f86-8280f8a 1282->1285 1285->1287 1288 8280f8c-8280fa3 1285->1288 1295 82810b0-82810d6 1287->1295 1296 8281046-8281068 1287->1296 1288->1281 1294 8280fa5-8280fae 1288->1294 1301 82810de-82810f4 1295->1301 1302 8281070-82810ae 1296->1302 1302->1301
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (aq$Haq
                                    • API String ID: 0-3785302501
                                    • Opcode ID: 07718dd921c45401212158e143489d441ff75eeebf13b609334e646e0288fb2e
                                    • Instruction ID: bb1c50e796bccc1939c04ea239b3a3a1d79f5dc90a523193a0204f230d793f9b
                                    • Opcode Fuzzy Hash: 07718dd921c45401212158e143489d441ff75eeebf13b609334e646e0288fb2e
                                    • Instruction Fuzzy Hash: A971C430710605CFCB45EB78C9549AEBBB6EF89211B1181AAE506DB3A1DF34DD06CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1308 828ae38-828ae47 1309 828af5d-828af82 1308->1309 1310 828ae4d-828ae59 1308->1310 1313 828af89-828aff0 1309->1313 1310->1313 1314 828ae5f-828ae75 1310->1314 1338 828aff2-828afff 1313->1338 1339 828b017-828b040 1313->1339 1321 828ae88-828ae9f 1314->1321 1322 828ae77-828ae86 1314->1322 1328 828aea9-828aeab 1321->1328 1329 828aea1 1321->1329 1322->1321 1333 828aeb2-828aebf 1328->1333 1331 828aead 1329->1331 1332 828aea3-828aea7 1329->1332 1331->1333 1332->1328 1332->1331 1334 828aec1-828aec5 1333->1334 1335 828aec7-828aeca 1333->1335 1337 828aecd-828aed5 1334->1337 1335->1337 1340 828aedf 1337->1340 1341 828aed7-828aedd 1337->1341 1338->1339 1345 828b001-828b00b 1338->1345 1343 828aee3-828af42 1340->1343 1341->1343 1348 828af44-828af4e 1343->1348 1349 828af56-828af5a 1343->1349 1347 828b010-828b014 1345->1347 1348->1349
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (aq$Haq
                                    • API String ID: 0-3785302501
                                    • Opcode ID: a7b7c38d76a284449239e6e791421b04aed560de1763e88471257996cef43f3e
                                    • Instruction ID: eb2bd612beb7b11a8a483b436dda3910df36dd442cf73f3085ee671a54ba5bde
                                    • Opcode Fuzzy Hash: a7b7c38d76a284449239e6e791421b04aed560de1763e88471257996cef43f3e
                                    • Instruction Fuzzy Hash: E751ED313017518FD729DF29C880B5ABBE6AF84320F10892EE55A8B7E1DF75E806CB51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1351 8287238-828724d 1353 828724f-828725f 1351->1353 1354 82872b1-8287313 1351->1354 1357 8287298-82872b0 1353->1357 1358 8287261-828726d 1353->1358 1367 828738f-82873be 1354->1367 1368 8287315-8287338 1354->1368 1362 828728e-8287297 1358->1362 1363 828726f-828728d 1358->1363 1373 82873c6-82873cf 1367->1373 1368->1367 1372 828733a-828738c 1368->1372
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (aq$,aq
                                    • API String ID: 0-1929014441
                                    • Opcode ID: 78e2f4f5c5b81eb241bbf3b7069243d1a343da396376f9ca7b5c775eb1aa0494
                                    • Instruction ID: 45e39db5c51a7600b0929f9686fa9ec274536d8f64fbd7fca2e2983dca9235a7
                                    • Opcode Fuzzy Hash: 78e2f4f5c5b81eb241bbf3b7069243d1a343da396376f9ca7b5c775eb1aa0494
                                    • Instruction Fuzzy Hash: FC41C43270015AAFCF019EE99C509FF7FEAEF88211B14406BFA45D3291DE35C91597A0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1376 308bff0-308bffe 1377 308c000-308c004 1376->1377 1378 308c005-308c00f 1376->1378 1377->1378 1379 308c03b-308c03f 1378->1379 1380 308c011-308c01e call 308af60 1378->1380 1382 308c041-308c04b 1379->1382 1383 308c053-308c094 1379->1383 1386 308c020 1380->1386 1387 308c034 1380->1387 1382->1383 1389 308c0a1-308c0af 1383->1389 1390 308c096-308c09e 1383->1390 1435 308c026 call 308c698 1386->1435 1436 308c026 call 308c689 1386->1436 1387->1379 1391 308c0b1-308c0b6 1389->1391 1392 308c0d3-308c0d5 1389->1392 1390->1389 1394 308c0b8-308c0bf call 308af6c 1391->1394 1395 308c0c1 1391->1395 1397 308c0d8-308c0df 1392->1397 1393 308c02c-308c02e 1393->1387 1396 308c170-308c1ed 1393->1396 1399 308c0c3-308c0d1 1394->1399 1395->1399 1428 308c1f0-308c1f4 1396->1428 1429 308c1f5-308c230 1396->1429 1400 308c0ec-308c0f3 1397->1400 1401 308c0e1-308c0e9 1397->1401 1399->1397 1404 308c100-308c109 call 308af7c 1400->1404 1405 308c0f5-308c0fd 1400->1405 1401->1400 1409 308c10b-308c113 1404->1409 1410 308c116-308c11b 1404->1410 1405->1404 1409->1410 1411 308c139-308c146 1410->1411 1412 308c11d-308c124 1410->1412 1419 308c148-308c166 1411->1419 1420 308c169-308c16f 1411->1420 1412->1411 1414 308c126-308c136 call 308af8c call 308af9c 1412->1414 1414->1411 1419->1420 1428->1429 1430 308c238-308c263 GetModuleHandleW 1429->1430 1431 308c232-308c235 1429->1431 1432 308c26c-308c280 1430->1432 1433 308c265-308c26b 1430->1433 1431->1430 1433->1432 1435->1393 1436->1393
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 590657c08ddb627d17fe38e186b9a9b2e6156d26825fc669269f670aefc04cba
                                    • Instruction ID: ccf83ce81c1385c7fb9587cde4c16c2eefadeca5c76b69f5edc1a73f7832c3b0
                                    • Opcode Fuzzy Hash: 590657c08ddb627d17fe38e186b9a9b2e6156d26825fc669269f670aefc04cba
                                    • Instruction Fuzzy Hash: FA815570A01B058FE764EF69D44475AFBF5FF88240F048A6ED08ADBA50DB75E845CBA0
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0308680F
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: aaccd2f6671e31db1aa49c28defd68390399c2709c2ba335b9ab2ee658ae311b
                                    • Instruction ID: ca63a47717cb6e8ff27f4694bf73ad8789802e04d14a190525f27aece896d142
                                    • Opcode Fuzzy Hash: aaccd2f6671e31db1aa49c28defd68390399c2709c2ba335b9ab2ee658ae311b
                                    • Instruction Fuzzy Hash: 2B415B76900248AFCF01DF99C844ADEBFF9FB49320F15806AEA58A7310C7399910DFA4
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 03087421
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 78e4b11f2443f3c2cabbcd70f3e7a53c60e2bdc0f9f787a6c0497bf9c48e29fa
                                    • Instruction ID: 8d25bfafa278ea8e5b1010436d2635d1a949a78adef4ea3e956731661dc2476c
                                    • Opcode Fuzzy Hash: 78e4b11f2443f3c2cabbcd70f3e7a53c60e2bdc0f9f787a6c0497bf9c48e29fa
                                    • Instruction Fuzzy Hash: B34101B0C00219CADB24DFA9C844B8EBBF5BF49704F24806AD458AB255DB756949CF90
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 03087421
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 09b61364c37d4c517df34d95bcc42cfd9aa2fe4680466eb71afe6742052f0490
                                    • Instruction ID: 2e2145d93aaadcbd420bb7b6904029e41f775f154d70025c2e2035969fc4a329
                                    • Opcode Fuzzy Hash: 09b61364c37d4c517df34d95bcc42cfd9aa2fe4680466eb71afe6742052f0490
                                    • Instruction Fuzzy Hash: 75410FB0C0061DCFDB24DFA9C844B9EBBF6BF49704F20806AD458AB255DB75694ACF90
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0308680F
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 842c5bf92bfc520465afa992171c8e441fee81200161cb1d5f4f527a11538ee3
                                    • Instruction ID: afb2cc0e56ec3b53cca0f262a72b5e88c17e0bf949f3907c5e3755f13389039f
                                    • Opcode Fuzzy Hash: 842c5bf92bfc520465afa992171c8e441fee81200161cb1d5f4f527a11538ee3
                                    • Instruction Fuzzy Hash: 3D21E3B5901208DFDB10DF9AD984AEEBBF8FB48310F14841AE958A3310D379A944CFA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0308680F
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 9e0bda4372010b9c98ab1e245e7117d245e5cecd7fae387f3b5f0d3d5e75bbc6
                                    • Instruction ID: 99a9be62986500c7b8e19d2168a59842fb10e639e803a8f4c3e6bfb7ed59f08d
                                    • Opcode Fuzzy Hash: 9e0bda4372010b9c98ab1e245e7117d245e5cecd7fae387f3b5f0d3d5e75bbc6
                                    • Instruction Fuzzy Hash: 9521E3B59002089FDB10CF9AD984ADEBBF8FB48310F14841AE958A3310D379A944CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Pl]q
                                    • API String ID: 0-2207481929
                                    • Opcode ID: 72bc41989f26a46a05a8a29bbd0247bd2e2c8f28cf779ccd39a5b8eed760de5d
                                    • Instruction ID: f66bcfdae5e902f2ab635ceed324e2e455a041c3e070b20a450defeb574ecc8c
                                    • Opcode Fuzzy Hash: 72bc41989f26a46a05a8a29bbd0247bd2e2c8f28cf779ccd39a5b8eed760de5d
                                    • Instruction Fuzzy Hash: 1FD1FF34B11218DFDB48EFA8D994E9EB7B6FF88700F108558E506AB3A5CB74AC05CB50
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0308C256
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4496276055.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_3080000_workbook.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 2ac7cfa75b2d65c838c79f88f6d20ea754627a18bd46bee1952f19f80c220106
                                    • Instruction ID: c7901db4508301c78057fdf368634bc238db18244a9ee3018149d6ca384f1b33
                                    • Opcode Fuzzy Hash: 2ac7cfa75b2d65c838c79f88f6d20ea754627a18bd46bee1952f19f80c220106
                                    • Instruction Fuzzy Hash: DB11DFB5C002498FDB10DF9AC444A9EFBF4AB89210F14851AD469A7650C379A545CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (aq
                                    • API String ID: 0-600464949
                                    • Opcode ID: 9146b03c2e8d932da26c20efbcba01a67f125d290116920eeae7d38d8af6231d
                                    • Instruction ID: 411272509a97876ea4fca2da7088d22ef15ff073c0ebe0fcd837c3aa08a03b48
                                    • Opcode Fuzzy Hash: 9146b03c2e8d932da26c20efbcba01a67f125d290116920eeae7d38d8af6231d
                                    • Instruction Fuzzy Hash: 77A1B335315201DFDB15DF68D994A2A7BB2EF89311F1584ADE6098F3A2CB35EC02CB51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Pl]q
                                    • API String ID: 0-2207481929
                                    • Opcode ID: 39b0586959d498f428cb4ce3d8e38d7d511419fb95cf9e2c1034db522717164d
                                    • Instruction ID: 6467a70111f19044b588767364e9cc17a7c708006211d383c77f5b0e6d039fee
                                    • Opcode Fuzzy Hash: 39b0586959d498f428cb4ce3d8e38d7d511419fb95cf9e2c1034db522717164d
                                    • Instruction Fuzzy Hash: 5FB1FF34B11218DFCB48EFA8D994E9EBBB6FF88700F104558E505AB3A5CB75AC45CB50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q
                                    • API String ID: 0-1259897404
                                    • Opcode ID: 0ac8c00a64a26286af7826a1846450715b7104d8c9603247034324a4c968357a
                                    • Instruction ID: 17e247ad629d80a013b08d9077dd5bf865734246980231f04b5f53c582dc2fd6
                                    • Opcode Fuzzy Hash: 0ac8c00a64a26286af7826a1846450715b7104d8c9603247034324a4c968357a
                                    • Instruction Fuzzy Hash: 7C41B230B193D19FCB07A73898687AD7FB6AF86610F19409BE441DF293CE645C0AC792
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q
                                    • API String ID: 0-1259897404
                                    • Opcode ID: a7a8fed6b761d7c805ce088ee5862aec4e057b3eda934a0f2660363c5a543f46
                                    • Instruction ID: 8ec0fa213fff274d94f3d190de191c9c93af6f8a9799367162f9ce17cdbeab2b
                                    • Opcode Fuzzy Hash: a7a8fed6b761d7c805ce088ee5862aec4e057b3eda934a0f2660363c5a543f46
                                    • Instruction Fuzzy Hash: 8C416F30B206148FCB48EB68D894AADB7BBEFC9610F10451AE502AB794CF749C06CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q
                                    • API String ID: 0-1259897404
                                    • Opcode ID: 0dea42373bdbb4d01a97f95d258f93567f6b386a2711ae9a5d8f1ff60cfb48d1
                                    • Instruction ID: e460b24a458e915a0fd95688d2385736c6d9e83630b3ccefa9c2145bfe13926c
                                    • Opcode Fuzzy Hash: 0dea42373bdbb4d01a97f95d258f93567f6b386a2711ae9a5d8f1ff60cfb48d1
                                    • Instruction Fuzzy Hash: 1F318F357406009FD718EB29C998F2B77EAAFC8B04F104568E6068B3A5CF75EC02CB94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q
                                    • API String ID: 0-1259897404
                                    • Opcode ID: 50b817eb6511fdb9c069b66cbc7dfca9469d1115ef344e03ffd7fa399901e999
                                    • Instruction ID: f6325fbd80a1830acba7aa75e1d98f415f7e5798d976b3e2601051171c83b392
                                    • Opcode Fuzzy Hash: 50b817eb6511fdb9c069b66cbc7dfca9469d1115ef344e03ffd7fa399901e999
                                    • Instruction Fuzzy Hash: 8E315E357406009FD718EB69C998F2A77EAAFC8B05F104568E6068B3A5CF75EC02CB94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: xaq
                                    • API String ID: 0-793007810
                                    • Opcode ID: d9b590ca6e61084c87f1bdce96ec11d0d64fec86a92c90598b0e6de3006b148b
                                    • Instruction ID: 1b0d6ba064785abed84828ca50cff3f935a0907e13fd68d2bb9a0da0fd7f890a
                                    • Opcode Fuzzy Hash: d9b590ca6e61084c87f1bdce96ec11d0d64fec86a92c90598b0e6de3006b148b
                                    • Instruction Fuzzy Hash: 55F0A0347001109FDB04CB18D981A69BBF5FF88224F158199E10A9F361C771FC068B90
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2534d2bb720dd270be59ef9afdcd5b1c3134aedbac9d256401e6ca05af8462ba
                                    • Instruction ID: f4b88db8ac699bd47c5b87dcc09f5993d8a3e12daaab6a9effe75ee8e4ca7eb0
                                    • Opcode Fuzzy Hash: 2534d2bb720dd270be59ef9afdcd5b1c3134aedbac9d256401e6ca05af8462ba
                                    • Instruction Fuzzy Hash: BEF1CB30B11605CFCB05EB38D894AAE7BB2AF85301F24856ED5029B3D1CE74AC46CB91
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6c233397c3ee4216d383cb576125bbbb6fded58803e2dd7661f87da32a8b897a
                                    • Instruction ID: 4b0298360905b3359d24ea0fb6e4e8653e805c34965eff77224b94fd5046bbdb
                                    • Opcode Fuzzy Hash: 6c233397c3ee4216d383cb576125bbbb6fded58803e2dd7661f87da32a8b897a
                                    • Instruction Fuzzy Hash: DF120834A10219CFCB54EF68C994A9DB7B2FF89300F5085A9E54AAB395DF30AD85CF50
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0a73b870aa41a1c7918f0cba574b3bbe34765acc96c44fdf7ccb75ab1423eb7e
                                    • Instruction ID: d785db944398e65d935225483372a799c6753c2a3b7e0c2587d01edf6bc0489b
                                    • Opcode Fuzzy Hash: 0a73b870aa41a1c7918f0cba574b3bbe34765acc96c44fdf7ccb75ab1423eb7e
                                    • Instruction Fuzzy Hash: 55C1C131A11751CFCF25DF28C454A2ABBF2BF85321F19865DE4968B6E2CB34E841CB41
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3092ea9f945d46e7c6d297b526b50d2eb002165e035cc89385716fb22e8f039a
                                    • Instruction ID: fdefb2bb392be13bbde775d107d1af3ad507e4d9db212f94af17886be72a587c
                                    • Opcode Fuzzy Hash: 3092ea9f945d46e7c6d297b526b50d2eb002165e035cc89385716fb22e8f039a
                                    • Instruction Fuzzy Hash: 89A18D34711604CFCB44EF68C8A49AE7BB6EFC9700B108969E5069B3A5DF74AC46CB91
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5e97620ddda3ed30bbb8ff511e127a3886c4b36d9f53b09b5c280dbb0d7dd05a
                                    • Instruction ID: f3491c8a88560167ab4facc26c96b0620a20f59b39da4711cad8e16f0e8183c2
                                    • Opcode Fuzzy Hash: 5e97620ddda3ed30bbb8ff511e127a3886c4b36d9f53b09b5c280dbb0d7dd05a
                                    • Instruction Fuzzy Hash: 27A16C34710618CFCB44EF68C8949AE7BB6EFC9700F108A58E5169B3A4DF74AD46CB91
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dc2b0d8fbde93600bccca17feac585eae029048619aa4a685264884f62433ee9
                                    • Instruction ID: 48199b21e2d28cfa9050ad974e48ec911caff2e2dc6c094bc92b1f87f2b5888d
                                    • Opcode Fuzzy Hash: dc2b0d8fbde93600bccca17feac585eae029048619aa4a685264884f62433ee9
                                    • Instruction Fuzzy Hash: 2B915E34710615DFCB45EF68D898A6DBBB6BF89611F1480A9E506DB3A5CF30EC42CB90
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c3935f35d8ae47c80c6da542c50f18395924064fcb28db76298329989c1d8acb
                                    • Instruction ID: 73d87184a4d685f7fcb4336d2cf815eba41a3536fe1f6dc88a2f5781c0c07a68
                                    • Opcode Fuzzy Hash: c3935f35d8ae47c80c6da542c50f18395924064fcb28db76298329989c1d8acb
                                    • Instruction Fuzzy Hash: 3A810674A22229EFCB14DF98D984E9DB7B2FF48310F154159E906AB3A1EB71EC41CB41
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d2218aa21f67029635db7802f9030d75dce5c30f3178ec52ebb8c62c5045dc7f
                                    • Instruction ID: b3950eb7eb0c584f20ac78d01e0ab9df694a884c6db081effaacef6ba5c66751
                                    • Opcode Fuzzy Hash: d2218aa21f67029635db7802f9030d75dce5c30f3178ec52ebb8c62c5045dc7f
                                    • Instruction Fuzzy Hash: DC612F34711605DFCB44EF68D894AADB7B6FF89711F1481A9E4069B3A5CB30EC42CB90
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 41fa232eadc32f4e6aaaa77a3dfc1296802e240c611c2cd6fe0195a7d56cdc8c
                                    • Instruction ID: 2b0cf94bf3659a6137ceeed869d59b788a92a4994f259268396bf37a972ebc8a
                                    • Opcode Fuzzy Hash: 41fa232eadc32f4e6aaaa77a3dfc1296802e240c611c2cd6fe0195a7d56cdc8c
                                    • Instruction Fuzzy Hash: 5D519D34B12605DFDB09EF64D594BAE7BB2EF88301F204429D8029B3D1CB78AD46CB95
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 116ae6fd1386286db07e62edbeb152ec163c17e80b315476304dc061156a107b
                                    • Instruction ID: 581c98626b0caa0a81f023872acb4dbfb0e44f787d91dbea661aba503e4024c9
                                    • Opcode Fuzzy Hash: 116ae6fd1386286db07e62edbeb152ec163c17e80b315476304dc061156a107b
                                    • Instruction Fuzzy Hash: 9E516D74B11605DFDB09EB64D554BAEBBB2EF88301F204529E9029B3D0CF74AD42CB95
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cb7acd38c2d8af3f4b6cc090d34225eac488516fe49d93129728de989ff558d3
                                    • Instruction ID: 3613bb82ad1837812f5e4a629154f26bd3fdf77552c606081fecedabaa1b935a
                                    • Opcode Fuzzy Hash: cb7acd38c2d8af3f4b6cc090d34225eac488516fe49d93129728de989ff558d3
                                    • Instruction Fuzzy Hash: 3841D131B11715CFCF60EB78D54029EBBF1FF84621B04896EC55ACBA94DA30E841CB81
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 082ba610190980c0ee0582ab1acbcf2c0776bab8304536040954b99f5f1d4f60
                                    • Instruction ID: 63e540ec51ef11543b4c444453ef2984ba8a52299bba74671722e8d8b476aab4
                                    • Opcode Fuzzy Hash: 082ba610190980c0ee0582ab1acbcf2c0776bab8304536040954b99f5f1d4f60
                                    • Instruction Fuzzy Hash: 3A419E31B012159FCB44DB68D854A9EBBF6FF88310B2585AAE50ADB361DB31EC01CB80
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7610789632b0fb8e01ce385b931a6972da1200fc3a91ac02cc3b893153ea341a
                                    • Instruction ID: ccb3cfd8967471d5c33dbc4883b4c86b460b64b6e0aaf9c20b72c627d6605443
                                    • Opcode Fuzzy Hash: 7610789632b0fb8e01ce385b931a6972da1200fc3a91ac02cc3b893153ea341a
                                    • Instruction Fuzzy Hash: 3431BE34B206048FCB45EF38C9955AEBBB6EFC9600B10815AE402DB3A5DF749D06CBD1
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5f51479fba65ecf547e620c509df52c64f4912d38b415d70d2a2d307c7aaa60c
                                    • Instruction ID: c63f58fe78f451ce3ec4b61459f91763d23c2d84e2ec79442b66cb3859f91474
                                    • Opcode Fuzzy Hash: 5f51479fba65ecf547e620c509df52c64f4912d38b415d70d2a2d307c7aaa60c
                                    • Instruction Fuzzy Hash: FE315C35A11119DBDF14EF68D858AEEB7B6FF88311F108029E801B7394CB359D05CBA0
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fe477cf2882267c48b7021b1ce1937c05f927d725dcca1896c7d016e12025abe
                                    • Instruction ID: 76c3040bf1d874dc6b5d32a1463a0711afbf21a902ac7725b8b3505c88933536
                                    • Opcode Fuzzy Hash: fe477cf2882267c48b7021b1ce1937c05f927d725dcca1896c7d016e12025abe
                                    • Instruction Fuzzy Hash: D5317234B106188FCB44EF68C995AAEB7BAEFC8700F10851AE5069B354DF709D06CBD1
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4495340399.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_16fd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bf328bb05fa29b548c27f4c418bce0060fc5e8121fcda37cfb966cea5ff4ebd1
                                    • Instruction ID: 61924d3be35d909951ff6dabf0e377ddb5306220a36d63bd06dd58d14ed40efd
                                    • Opcode Fuzzy Hash: bf328bb05fa29b548c27f4c418bce0060fc5e8121fcda37cfb966cea5ff4ebd1
                                    • Instruction Fuzzy Hash: 4321F271604204DFDB15DF68D984F26BF65FB88354F20C56DEA0A4B396C33AE447CA62
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9bc8607e8822f381af9d6da807e9820942bdda6d775c3c8b396c9dde124e5f5a
                                    • Instruction ID: 23211b7ea1401c769fae7bd9ec10a835b3af3085bd1287a472b3df94927b2d42
                                    • Opcode Fuzzy Hash: 9bc8607e8822f381af9d6da807e9820942bdda6d775c3c8b396c9dde124e5f5a
                                    • Instruction Fuzzy Hash: A8212771619784DFC7129B39D8106067FF1AF87231B0986AFD0A5CB6E7C630A84ACB11
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 289ebf005c076ceda8358584a35bb06e81241a8b1ec8281209c52e87ee1841cb
                                    • Instruction ID: 556b35cdc4042d06270d0212c75cfc782fa56d5250997ebf20882461a60149be
                                    • Opcode Fuzzy Hash: 289ebf005c076ceda8358584a35bb06e81241a8b1ec8281209c52e87ee1841cb
                                    • Instruction Fuzzy Hash: 1E21CA7520A7808FD302AB3498645593F71EF93710B8A44EBC5428F2A3DA39980ACB26
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: adc0c987b5e167a2341777e93123ca576230de3926c7c631935747d8a3a2e370
                                    • Instruction ID: 8d5c9056e3f67736e73e3f73f3b502dbfb866d68896557cfa37b5f7c8ae705dd
                                    • Opcode Fuzzy Hash: adc0c987b5e167a2341777e93123ca576230de3926c7c631935747d8a3a2e370
                                    • Instruction Fuzzy Hash: A8216935A10219DFCB05DFA8C4849DE7FB6BB88321F14852AE816AB390CE319881CF91
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 261a350e9fed029787b0c20c58cae743606f64dbcf905a5353c07bb86b0c34ed
                                    • Instruction ID: bf0ce6b60a282b338bdaef4159ed32fb3ad3039e8271e608f85ae758b8a6bec8
                                    • Opcode Fuzzy Hash: 261a350e9fed029787b0c20c58cae743606f64dbcf905a5353c07bb86b0c34ed
                                    • Instruction Fuzzy Hash: A8215935A10219DFCF159FA8C8549EEBFB6FB8C320F14412AE816A7394CE319841CB91
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 175b8b95142271a1da068d8341713511a3b419f0901ed6a4bd3a5d5ab63ce708
                                    • Instruction ID: 4df707992539e4e5909a33bb60f740f38b3e86a65ae292dba795e76e952ca8ce
                                    • Opcode Fuzzy Hash: 175b8b95142271a1da068d8341713511a3b419f0901ed6a4bd3a5d5ab63ce708
                                    • Instruction Fuzzy Hash: D011E536210500EFCF065F98D904DAA7F72EF89212B0540DAE6058F272CB36CC56DB50
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 89ba2282cead71207dbeb77614129ff5f1bc7ac782b77e246a792989b5d977d0
                                    • Instruction ID: 98cb8020ef6f424c5399a85492da7c3f87557fa4a553337eb8b9eb7741fe4169
                                    • Opcode Fuzzy Hash: 89ba2282cead71207dbeb77614129ff5f1bc7ac782b77e246a792989b5d977d0
                                    • Instruction Fuzzy Hash: DB21DE70610204CFCB55EF28D984AAABBF6FF85311F144469E4029B3A1DB30AD05CB61
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4495340399.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_16fd000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 969cfd739f1dacd2dd5f55382d77606a307225c8b33ce6c1078b35d2ecf53e46
                                    • Instruction ID: 3127601ae05317eae2d64baf92a43a3ef48770fac6bd2f5f60423c2517f998ea
                                    • Opcode Fuzzy Hash: 969cfd739f1dacd2dd5f55382d77606a307225c8b33ce6c1078b35d2ecf53e46
                                    • Instruction Fuzzy Hash: AF218B755093808FDB03CF24D994B15BF71EB46214F28C5EAD9498B6A7C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ced5c0b6a815178457d3e332273eae24465bd44dd1329a1928655bf53bedb391
                                    • Instruction ID: 1742efe1f53f6971e0eacb16a8a1a7459c35dd4e0200167824c37551df64446f
                                    • Opcode Fuzzy Hash: ced5c0b6a815178457d3e332273eae24465bd44dd1329a1928655bf53bedb391
                                    • Instruction Fuzzy Hash: A0117934B10604CFCB54EF28D984AAEB7BAEFC8310F144529E5069B360DB70ED05CBA1
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a8078f2a67803dd3098a6d12bcf1fbc098cab93345da0cd6f8b472dd880adfff
                                    • Instruction ID: 978eaa11622e3a690ac4828093da800c552b2701ce632d35d1ba6f7a440a4870
                                    • Opcode Fuzzy Hash: a8078f2a67803dd3098a6d12bcf1fbc098cab93345da0cd6f8b472dd880adfff
                                    • Instruction Fuzzy Hash: E711A034A26225DFCB11DB68D894EADBBB1FF48320F05019AF512AB3A2CB349C41CB41
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 954de88f62a8710ffef7e008bb99d22177f8229e3c370ea7b3d7ae769f8e688b
                                    • Instruction ID: 5bde8265f2be102b8a83f992ec6578aa7f6ff4cbb873c2a8d07beaacf5b148c6
                                    • Opcode Fuzzy Hash: 954de88f62a8710ffef7e008bb99d22177f8229e3c370ea7b3d7ae769f8e688b
                                    • Instruction Fuzzy Hash: 0001C231315780CFC715E728D454A26BBA2AFC5221F1886ADD1568B7D1CB74AC06DB41
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4ed29f8e6e1b59bf9d2ae8ab3f83442fbc43f2480d09b3fdd8d4b6ec5175e727
                                    • Instruction ID: 252abe42d037e5b0b1335b329fd98825ff32fd8b3c207b58d3ed7a0976d8aae0
                                    • Opcode Fuzzy Hash: 4ed29f8e6e1b59bf9d2ae8ab3f83442fbc43f2480d09b3fdd8d4b6ec5175e727
                                    • Instruction Fuzzy Hash: 5C01CC35E117099FCB01EFA8D4049ADBFB5AF89311B0081AEE449E7360EB309A08CF61
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 70945b5547310368e6fc37b7c1b13ad0bacae32af8d71ac5ce639d69a3e3e065
                                    • Instruction ID: 884cf64626ebe945c73144d9414d6769dc80e8d282ef839076aa850935e830ec
                                    • Opcode Fuzzy Hash: 70945b5547310368e6fc37b7c1b13ad0bacae32af8d71ac5ce639d69a3e3e065
                                    • Instruction Fuzzy Hash: A5017175300744DFC3069B28D61491ABBB2EF89711710859AE9058B7A1CF35DD03CB95
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 25ccf390dc2823321643a08123818732e79afc949914067666f62db44ef4b51b
                                    • Instruction ID: bf58bba7c18a6e5ab199af08a810539dee7d7c9c2ff81942624ca5f23177c9b1
                                    • Opcode Fuzzy Hash: 25ccf390dc2823321643a08123818732e79afc949914067666f62db44ef4b51b
                                    • Instruction Fuzzy Hash: 3C019E35711610DFCB25AB28D458A2BBBA2EFC8621F14856CE6164B7D0CB75EC02DB84
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 19e1a44058cdb7e4d6e4a6e2411200516a3cf76c96d2fd6c250614244934a9d1
                                    • Instruction ID: 95e51432b58956f2d148c0de71a676cec3140c8ae319735b583b223325e236ae
                                    • Opcode Fuzzy Hash: 19e1a44058cdb7e4d6e4a6e2411200516a3cf76c96d2fd6c250614244934a9d1
                                    • Instruction Fuzzy Hash: 61018135300610AFC705DB28D51491EBBA6EFCC711710812AEA0687790CF75EC03CBD5
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4495267368.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_16ed000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 56b90e07b7c379f7fa8ceeccd564aaa60f6cace2ae6d93815679169dc245ed2f
                                    • Instruction ID: 885e48692aa497768809c851d01eea507363fafb26d09edc8d77695d4b8a188e
                                    • Opcode Fuzzy Hash: 56b90e07b7c379f7fa8ceeccd564aaa60f6cace2ae6d93815679169dc245ed2f
                                    • Instruction Fuzzy Hash: 44F0E7B6200650AF97208F0AD885C27FBADFBD4674715C59AE84A4B712C671EC42CEA0
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 15cc0815fe5414b19f43346eda52229a4e5d451976a670326b2f74575d304e35
                                    • Instruction ID: e8149e374c61a94b82ea834d7a04899b0c8e83b6c1720bd52d0c17090c69fefb
                                    • Opcode Fuzzy Hash: 15cc0815fe5414b19f43346eda52229a4e5d451976a670326b2f74575d304e35
                                    • Instruction Fuzzy Hash: 9DF0CD793013809FC306CB28C454D6A7FB2EF8A321B0544AAE946CF3B2CA31DC06DB50
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4495267368.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_16ed000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ee3d53c97ba917c09a07cb505b8f08b7587f3760aa67b55b7cd5b5b9e1c3e050
                                    • Instruction ID: 970f3f81276e91abce0894fefc1f0b3894fdd88b7b26ad9bdafd7e93c3051679
                                    • Opcode Fuzzy Hash: ee3d53c97ba917c09a07cb505b8f08b7587f3760aa67b55b7cd5b5b9e1c3e050
                                    • Instruction Fuzzy Hash: 84F03775104680AFD325CF06CC84C22BBF9FF89760B198589E88A8B362C631FC42CF60
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c445859f7b16abd1fdf66aa1f36d148b45aeae33a1669dcc0b562713d5d61a9f
                                    • Instruction ID: 814f2e59aab9b7487d66ee5e0250814ad1926de73f4231c305d7e683e20a52af
                                    • Opcode Fuzzy Hash: c445859f7b16abd1fdf66aa1f36d148b45aeae33a1669dcc0b562713d5d61a9f
                                    • Instruction Fuzzy Hash: E6F03A353103009FC704DB19D854D2A77AAEFC9721B144069F906CB360CE31EC42DB90
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a7c5ccce2be06ae3dfe8ae0c56255414bc9da4e2e14b2fd9ede3ace420d46191
                                    • Instruction ID: ef8fc87120ab60577fbb6d969a2762e8d843e62914851c10f166e03db134f7cf
                                    • Opcode Fuzzy Hash: a7c5ccce2be06ae3dfe8ae0c56255414bc9da4e2e14b2fd9ede3ace420d46191
                                    • Instruction Fuzzy Hash: F8D02B2170A1508FD304D2B499711AE3B979BC9110788C05FC54DC7A95DC398C034359
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 95e0e718509916fef51bf459b2f0245b2715c214e22a27f7c91399918c01c0cd
                                    • Instruction ID: 7cfd0d4c3fddf5933c5c516c23f67fb3a1d98f3b765f6f20d2bec2b0d7cd1633
                                    • Opcode Fuzzy Hash: 95e0e718509916fef51bf459b2f0245b2715c214e22a27f7c91399918c01c0cd
                                    • Instruction Fuzzy Hash: 4DD0123570612487C718E6BAA8645AF76CFDBCD261B44C02AD60EC3B54CD799C0347ED
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c16445234cd1cd601a4b6716a53d7a982afa153b1ec7842522197510c767dae5
                                    • Instruction ID: 641ddd9e09dde10c7fdd7d2e119e9acb59a3d51fdb1d42da3dbf6915f3d34ee2
                                    • Opcode Fuzzy Hash: c16445234cd1cd601a4b6716a53d7a982afa153b1ec7842522197510c767dae5
                                    • Instruction Fuzzy Hash: 75D0923604D684AFC3028B24E8558507FB19E1666132E80D7E488CF673C6268C5ACB16
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1940ff109858dc60fa9c02908d7787df2cec87e889afe8340f4e3ba9e588c4c4
                                    • Instruction ID: 1eda7b764c6fd32a83bc3be46451f965d8c350d8707f4de00ecae66983004eb0
                                    • Opcode Fuzzy Hash: 1940ff109858dc60fa9c02908d7787df2cec87e889afe8340f4e3ba9e588c4c4
                                    • Instruction Fuzzy Hash: C2D0A97221ABC18FD303CB30A5254403F30EA4321039588EAD086CF493C339984ADB2A
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a4e5112f517afd36ea840ba8af381a237089a20a5daabd57e49ee680a295d96
                                    • Instruction ID: 9052a322cae696b60329e7136e38bc78a429c3a4202a7e3c45a47f36ea69d9c8
                                    • Opcode Fuzzy Hash: 3a4e5112f517afd36ea840ba8af381a237089a20a5daabd57e49ee680a295d96
                                    • Instruction Fuzzy Hash: 91B012E3EA0A148748010CF4FC2C6DE2F43F8740FA75C0071E48CC6326910FC6470564
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 04a6343fbd4700706ef2b5cadc7211305ebb299552f6b9df566e3bebd50c6aa2
                                    • Instruction ID: a2dc259c2525898e418c4b3dbd914e9bdaf0248e3e64ef4e1b157ef62cf3eb13
                                    • Opcode Fuzzy Hash: 04a6343fbd4700706ef2b5cadc7211305ebb299552f6b9df566e3bebd50c6aa2
                                    • Instruction Fuzzy Hash: 73C08C3842220CCFEE206B60D449735BB9CE70433BF10229CEC08051C18B7664D3C993
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                    • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                    • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                    • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 304e9e2103c68f733927a7b048fbe792a07fad40ee1e1ea353e53303cea05ab8
                                    • Instruction ID: 63b7206a1deec53de168eaedddd7c36ff7ba00c58f4eaa4236a759c56ce0b1a4
                                    • Opcode Fuzzy Hash: 304e9e2103c68f733927a7b048fbe792a07fad40ee1e1ea353e53303cea05ab8
                                    • Instruction Fuzzy Hash: 9CB09236008308EB8601AA84E904855BB69AB58660700C025B609061118B32A822DB94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.4528078849.0000000008280000.00000040.00000800.00020000.00000000.sdmp, Offset: 08280000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_8280000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (_]q$(_]q$(_]q$(_]q
                                    • API String ID: 0-2651352888
                                    • Opcode ID: e8a736befb37d85f867c91f0c159465a7116ec972ca736485d3bba0e5f1f7b10
                                    • Instruction ID: f5306fa617974ee6f3a5bfdadc1392838d68f0a012f9f828ad4fccebf9df4a76
                                    • Opcode Fuzzy Hash: e8a736befb37d85f867c91f0c159465a7116ec972ca736485d3bba0e5f1f7b10
                                    • Instruction Fuzzy Hash: DC61DD34B15245CFCB05AB78C89446E7FB2EF8A200B1548AED4469B3A2EB35DC56CB90

                                    Execution Graph

                                    Execution Coverage:6.8%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:91
                                    Total number of Limit Nodes:14
                                    execution_graph 17954 1846847 17955 18467d3 DuplicateHandle 17954->17955 17957 1846853 17954->17957 17956 184681e 17955->17956 17958 1846540 17959 1846586 GetCurrentProcess 17958->17959 17961 18465d1 17959->17961 17962 18465d8 GetCurrentThread 17959->17962 17961->17962 17963 1846615 GetCurrentProcess 17962->17963 17964 184660e 17962->17964 17965 184664b 17963->17965 17964->17963 17966 1846673 GetCurrentThreadId 17965->17966 17967 18466a4 17966->17967 18055 58f26d8 CloseHandle 18056 58f273f 18055->18056 17968 184bf08 17971 184bff0 17968->17971 17969 184bf17 17972 184c034 17971->17972 17973 184c011 17971->17973 17972->17969 17973->17972 17974 184c238 GetModuleHandleW 17973->17974 17975 184c265 17974->17975 17975->17969 17976 1844668 17977 1844676 17976->17977 17982 1846de0 17977->17982 17980 1844704 17983 1846e05 17982->17983 17991 1846ef0 17983->17991 17995 1846edf 17983->17995 17984 18446e9 17987 184421c 17984->17987 17988 1844227 17987->17988 18003 1848560 17988->18003 17990 1848806 17990->17980 17993 1846f17 17991->17993 17992 1846ff4 17992->17992 17993->17992 17999 1846414 17993->17999 17997 1846f17 17995->17997 17996 1846ff4 17996->17996 17997->17996 17998 1846414 CreateActCtxA 17997->17998 17998->17996 18000 1847370 CreateActCtxA 17999->18000 18002 1847433 18000->18002 18004 184856b 18003->18004 18007 1848580 18004->18007 18006 18488dd 18006->17990 18008 184858b 18007->18008 18011 18485b0 18008->18011 18010 18489ba 18010->18006 18012 18485bb 18011->18012 18015 18485e0 18012->18015 18014 1848aad 18014->18010 18017 18485eb 18015->18017 18016 1849ed1 18016->18014 18017->18016 18019 184df60 18017->18019 18020 184df91 18019->18020 18021 184dfb5 18020->18021 18024 184e110 18020->18024 18028 184e120 18020->18028 18021->18016 18025 184e12d 18024->18025 18026 184e166 18025->18026 18032 184c464 18025->18032 18026->18021 18029 184e12d 18028->18029 18030 184c464 3 API calls 18029->18030 18031 184e166 18029->18031 18030->18031 18031->18021 18033 184c46f 18032->18033 18035 184e1d8 18033->18035 18036 184c498 18033->18036 18037 184c4a3 18036->18037 18038 184e247 18037->18038 18039 18485e0 3 API calls 18037->18039 18040 184e256 18038->18040 18043 184e2b0 18038->18043 18049 184e2c0 18038->18049 18039->18038 18040->18035 18044 184e2ee 18043->18044 18045 184c530 GetFocus 18044->18045 18046 184e317 18044->18046 18048 184e3bf 18044->18048 18045->18046 18047 184e3ba KiUserCallbackDispatcher 18046->18047 18046->18048 18047->18048 18050 184e2ee 18049->18050 18051 184c530 GetFocus 18050->18051 18052 184e317 18050->18052 18054 184e3bf 18050->18054 18051->18052 18053 184e3ba KiUserCallbackDispatcher 18052->18053 18052->18054 18053->18054 18057 58f2130 18058 58f22bb 18057->18058 18059 58f2156 18057->18059 18059->18058 18062 58f23a8 18059->18062 18065 58f23b0 PostMessageW 18059->18065 18063 58f23b0 PostMessageW 18062->18063 18064 58f241c 18063->18064 18064->18059 18066 58f241c 18065->18066 18066->18059

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 536 1846518-18465cf GetCurrentProcess 542 18465d1-18465d7 536->542 543 18465d8-184660c GetCurrentThread 536->543 542->543 544 1846615-1846649 GetCurrentProcess 543->544 545 184660e-1846614 543->545 547 1846652-184666d call 184670f 544->547 548 184664b-1846651 544->548 545->544 551 1846673-18466a2 GetCurrentThreadId 547->551 548->547 552 18466a4-18466aa 551->552 553 18466ab-184670d 551->553 552->553
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 018465BE
                                    • GetCurrentThread.KERNEL32 ref: 018465FB
                                    • GetCurrentProcess.KERNEL32 ref: 01846638
                                    • GetCurrentThreadId.KERNEL32 ref: 01846691
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID: a`RI
                                    • API String ID: 2063062207-1837384376
                                    • Opcode ID: e4755fd2cc6c8322636c6d9a931c6f4c73e4fc579be017152bfb3bd4fb75f074
                                    • Instruction ID: b210b2e36142bc2dab02141c5092907250029dd865f440fb2b69c22938c57181
                                    • Opcode Fuzzy Hash: e4755fd2cc6c8322636c6d9a931c6f4c73e4fc579be017152bfb3bd4fb75f074
                                    • Instruction Fuzzy Hash: C25188B09013498FDB08CFA9D548B9EBFF5EF49314F208459D509A7290DB389948CFA9

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 561 1846540-18465cf GetCurrentProcess 565 18465d1-18465d7 561->565 566 18465d8-184660c GetCurrentThread 561->566 565->566 567 1846615-1846649 GetCurrentProcess 566->567 568 184660e-1846614 566->568 570 1846652-184666d call 184670f 567->570 571 184664b-1846651 567->571 568->567 574 1846673-18466a2 GetCurrentThreadId 570->574 571->570 575 18466a4-18466aa 574->575 576 18466ab-184670d 574->576 575->576
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 018465BE
                                    • GetCurrentThread.KERNEL32 ref: 018465FB
                                    • GetCurrentProcess.KERNEL32 ref: 01846638
                                    • GetCurrentThreadId.KERNEL32 ref: 01846691
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID: a`RI
                                    • API String ID: 2063062207-1837384376
                                    • Opcode ID: 49abca8c548ae5affdb41c770b89f395e4bf72f497bee23f2fec255144220bb7
                                    • Instruction ID: 47821d2e38e22aaa94363a0805565f7a67aa527b597a25c382597ae43554633e
                                    • Opcode Fuzzy Hash: 49abca8c548ae5affdb41c770b89f395e4bf72f497bee23f2fec255144220bb7
                                    • Instruction Fuzzy Hash: D45147B09013098FDB18DFA9D548BAEBFF5EF49304F208459E509A7350DB346948CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 638 184bff0-184c00f 639 184c011-184c01e call 184af60 638->639 640 184c03b-184c03f 638->640 647 184c034 639->647 648 184c020 639->648 641 184c041-184c04b 640->641 642 184c053-184c094 640->642 641->642 649 184c096-184c09e 642->649 650 184c0a1-184c0af 642->650 647->640 693 184c026 call 184c698 648->693 694 184c026 call 184c6ab 648->694 649->650 652 184c0b1-184c0b6 650->652 653 184c0d3-184c0d5 650->653 651 184c02c-184c02e 651->647 654 184c170-184c230 651->654 656 184c0c1 652->656 657 184c0b8-184c0bf call 184af6c 652->657 655 184c0d8-184c0df 653->655 688 184c232-184c235 654->688 689 184c238-184c263 GetModuleHandleW 654->689 659 184c0e1-184c0e9 655->659 660 184c0ec-184c0f3 655->660 658 184c0c3-184c0d1 656->658 657->658 658->655 659->660 663 184c0f5-184c0fd 660->663 664 184c100-184c109 call 184af7c 660->664 663->664 669 184c116-184c11b 664->669 670 184c10b-184c113 664->670 671 184c11d-184c124 669->671 672 184c139-184c146 669->672 670->669 671->672 674 184c126-184c136 call 184af8c call 184af9c 671->674 679 184c148-184c166 672->679 680 184c169-184c16f 672->680 674->672 679->680 688->689 690 184c265-184c26b 689->690 691 184c26c-184c280 689->691 690->691 693->651 694->651
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0184C256
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID: a`RI
                                    • API String ID: 4139908857-1837384376
                                    • Opcode ID: 68aca1930082884bdcf039261c67d463748ab9ff81e73b899751e53aac2ca66e
                                    • Instruction ID: 5d512a2303bd9be1b7b84ed6a611140b94561f4ae62a66691698b39dfa056fcf
                                    • Opcode Fuzzy Hash: 68aca1930082884bdcf039261c67d463748ab9ff81e73b899751e53aac2ca66e
                                    • Instruction Fuzzy Hash: AF817970A01B498FD724DF6AD44475ABBF5FF88300F00892ED48ACBA50DB75E949CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 695 1846414-1847431 CreateActCtxA 698 1847433-1847439 695->698 699 184743a-1847494 695->699 698->699 706 1847496-1847499 699->706 707 18474a3-18474a7 699->707 706->707 708 18474b8 707->708 709 18474a9-18474b5 707->709 711 18474b9 708->711 709->708 711->711
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 01847421
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID: a`RI
                                    • API String ID: 2289755597-1837384376
                                    • Opcode ID: eca5c1bc31095f56701e0dce8bca940f71b8f605f810351091591602d2628b9b
                                    • Instruction ID: 56d5a40945255120c7784b276d9896386152b1d86ad59d70b7256e90ef0ed25a
                                    • Opcode Fuzzy Hash: eca5c1bc31095f56701e0dce8bca940f71b8f605f810351091591602d2628b9b
                                    • Instruction Fuzzy Hash: 7741B2B0C0071DCBDB24DFA9C884B9DBBF5BF49304F20806AD918AB255DB756949CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 712 1847364-184736b 713 1847370-1847431 CreateActCtxA 712->713 715 1847433-1847439 713->715 716 184743a-1847494 713->716 715->716 723 1847496-1847499 716->723 724 18474a3-18474a7 716->724 723->724 725 18474b8 724->725 726 18474a9-18474b5 724->726 728 18474b9 725->728 726->725 728->728
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 01847421
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID: a`RI
                                    • API String ID: 2289755597-1837384376
                                    • Opcode ID: 60530ad34363b40e5dbe848a8fc76ae000090820dc2698f4cc47a5ec82364acc
                                    • Instruction ID: 1ffbcf59192f43a579b87f886b93c10be636d6625b119dcb0f2f69a559710638
                                    • Opcode Fuzzy Hash: 60530ad34363b40e5dbe848a8fc76ae000090820dc2698f4cc47a5ec82364acc
                                    • Instruction Fuzzy Hash: 6741F2B0C0021DCFDB24DFA9C884B9DBBF5BF48304F20805AD518AB255DB756949CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 729 1846780-1846781 730 1846703-184670d 729->730 731 1846783-18467d0 729->731 733 18467d3-184681c DuplicateHandle 731->733 734 1846825-1846842 733->734 735 184681e-1846824 733->735 735->734
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0184680F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID: a`RI
                                    • API String ID: 3793708945-1837384376
                                    • Opcode ID: c163b599303d236e73446d0855ec01712ef690efa3e18f87fc70930477eac0d7
                                    • Instruction ID: 6d95230020fff306012e110124fca9ecaa455264f8a0cc474204ef67b2cb6f69
                                    • Opcode Fuzzy Hash: c163b599303d236e73446d0855ec01712ef690efa3e18f87fc70930477eac0d7
                                    • Instruction Fuzzy Hash: 6A21F7B5D002089FDB10CF9AD984ADEFBF4FB48320F14805AE918A3211D775A954CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 738 1846788-18467d0 739 18467d3-184681c DuplicateHandle 738->739 740 1846825-1846842 739->740 741 184681e-1846824 739->741 741->740
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0184680F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID: a`RI
                                    • API String ID: 3793708945-1837384376
                                    • Opcode ID: 7524b144cde6c7d2acc78a5667de96f83588a4e6fa5cbf3e92e6300549e20cac
                                    • Instruction ID: 1949fd47b3cac83b53175636da44005b2d1cebdaa8bcdaad4146504b59d6fbd2
                                    • Opcode Fuzzy Hash: 7524b144cde6c7d2acc78a5667de96f83588a4e6fa5cbf3e92e6300549e20cac
                                    • Instruction Fuzzy Hash: 0B21C4B5D002489FDB10CFAAD984ADEBFF9FB48310F14841AE918A3350D779A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 744 184c1f0-184c230 745 184c232-184c235 744->745 746 184c238-184c263 GetModuleHandleW 744->746 745->746 747 184c265-184c26b 746->747 748 184c26c-184c280 746->748 747->748
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0184C256
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID: a`RI
                                    • API String ID: 4139908857-1837384376
                                    • Opcode ID: 4fb99648d835c70181dbc20198c8d927c6623a8dfcdbb3cd603a1a7b9e89e391
                                    • Instruction ID: 9f04c2968f44bdd8886e90053ce1e208f3f676f58a20604641ba42414f71bc8b
                                    • Opcode Fuzzy Hash: 4fb99648d835c70181dbc20198c8d927c6623a8dfcdbb3cd603a1a7b9e89e391
                                    • Instruction Fuzzy Hash: 4F1110B5C002498FDB10DF9AC444ADEFBF8EF88310F10841AD929B7210C3B9A645CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 750 58f23a8-58f241a PostMessageW 752 58f241c-58f2422 750->752 753 58f2423-58f2437 750->753 752->753
                                    APIs
                                    • PostMessageW.USER32(?,?,?,?), ref: 058F240D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2169326120.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_58f0000_workbook.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID: a`RI
                                    • API String ID: 410705778-1837384376
                                    • Opcode ID: b10b676609b1d229696642201d3322d6b4f3488b422afecb334c47bbee057dd6
                                    • Instruction ID: 52f6f7805e097f4dee9009c9e14127de8e95103cbf308ae95060231f94ee444e
                                    • Opcode Fuzzy Hash: b10b676609b1d229696642201d3322d6b4f3488b422afecb334c47bbee057dd6
                                    • Instruction Fuzzy Hash: 9911C5B58003499FDB10DF9AD885BDEBFF8EB58320F108459EA19A7250D379A944CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 755 58f23b0-58f241a PostMessageW 756 58f241c-58f2422 755->756 757 58f2423-58f2437 755->757 756->757
                                    APIs
                                    • PostMessageW.USER32(?,?,?,?), ref: 058F240D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2169326120.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_58f0000_workbook.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID: a`RI
                                    • API String ID: 410705778-1837384376
                                    • Opcode ID: 66df7ccdc036aa0915c36be365d31fe64154a20a7ebe431ccfd55624e0a07bc0
                                    • Instruction ID: 74221c07a7186b4f64a7a6d7949520be278b8a99222169acff04b4648ce12b20
                                    • Opcode Fuzzy Hash: 66df7ccdc036aa0915c36be365d31fe64154a20a7ebe431ccfd55624e0a07bc0
                                    • Instruction Fuzzy Hash: E211D3B58003499FDB10DF9AD845BDEBBF8FB58320F10845ADA19A7240C379A984CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 759 58f264f-58f2664 760 58f2666-58f267c 759->760 761 58f2682-58f269c 759->761 763 58f269e-58f26b9 call 58f147c 761->763 764 58f26bc-58f273d CloseHandle 761->764 768 58f273f-58f2745 764->768 769 58f2746-58f276e 764->769 768->769
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2169326120.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_58f0000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: a`RI
                                    • API String ID: 0-1837384376
                                    • Opcode ID: d19afd9bdb11ad50274bd0e79f6b6b7d00f2570ad47fab87e47c057ab185f0f3
                                    • Instruction ID: c299085e2a1da177fa22a3d4ff9cb14d782fc63b620311a3c04e69e223be0d5a
                                    • Opcode Fuzzy Hash: d19afd9bdb11ad50274bd0e79f6b6b7d00f2570ad47fab87e47c057ab185f0f3
                                    • Instruction Fuzzy Hash: 5831EBBA8043888FCB11DFA9D844BDABFF0BF19310F14849AD995A7252C3389944CFA1
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 058F2730
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2169326120.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_58f0000_workbook.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID: a`RI
                                    • API String ID: 2962429428-1837384376
                                    • Opcode ID: a57f3d99f9d9b19b95e074ec62d1bfa6be798c56e01fc5fd0b27b7906d87bcb6
                                    • Instruction ID: 20ed8ca1a9a3bfe4ff38696644d6ad923a3e1002e761e0e7ee3ad50581ca135c
                                    • Opcode Fuzzy Hash: a57f3d99f9d9b19b95e074ec62d1bfa6be798c56e01fc5fd0b27b7906d87bcb6
                                    • Instruction Fuzzy Hash: 191106B58002498FCB10DF9AC545BDEBBF4FB48320F10845ADA59A7240D739A944CFA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0184680F
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157767456.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_1840000_workbook.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 13193feaabf566a689fdebb66133efc08a111bc26552ee823269d80d11d1c64e
                                    • Instruction ID: 31d5bc0cf2703dfed6027264b79504c3bd1f61a29a909cafe02f53aa1d9ec93d
                                    • Opcode Fuzzy Hash: 13193feaabf566a689fdebb66133efc08a111bc26552ee823269d80d11d1c64e
                                    • Instruction Fuzzy Hash: 1F412974A40304DFE704DF65F449B6A7BB9FB48311F148429E9069B380DB785941CF21
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157304992.00000000017AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017AD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_17ad000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf6deeb10f614ad7f54fa8e73e778a76f9da7253cd81ec837395a0ac6477fc48
                                    • Instruction ID: fe55d2f5214882252fcb2f00b8f63292bad74d180af96388c32b6c4d89366785
                                    • Opcode Fuzzy Hash: cf6deeb10f614ad7f54fa8e73e778a76f9da7253cd81ec837395a0ac6477fc48
                                    • Instruction Fuzzy Hash: 5F210371684204DFCB25DF68D984B17FF65EB88314F60C6A9D9094B656C33AD406CA61
                                    Memory Dump Source
                                    • Source File: 0000000B.00000002.2157304992.00000000017AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017AD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_11_2_17ad000_workbook.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction ID: c892b94cc35907913457ec6eabcf30731c959ffd77ed794cc6f9bd20401520cf
                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction Fuzzy Hash: 2611D075544280CFDB12CF54D5C4B16FF71FB88314F24C6A9D8494B656C33AD40ACB62